WorldWideScience

Sample records for 3g wireless networks

  1. Providing QoS guarantee in 3G wireless networks

    Science.gov (United States)

    Chuah, MooiChoo; Huang, Min; Kumar, Suresh

    2001-07-01

    The third generation networks and services present opportunities to offer multimedia applications and services that meet end-to-end quality of service requirements. In this article, we present UMTS QoS architecture and its requirements. This includes the definition of QoS parameters, traffic classes, the end-to-end data delivery model, and the mapping of end-to-end services to the services provided by the network elements of the UMTS. End-to-end QoS of a user flow is achieved by the combination of the QoS control over UMTS Domain and the IP core Network. In the Third Generation Wireless network, UMTS bearer service manager is responsible to manage radio and transport resources to QoS-enabled applications. The UMTS bearer service consists of the Radio Access Bearer Service between Mobile Terminal and SGSN and Core Network bearer service between SGSN and GGSN. The Radio Access Bearer Service is further realized by the Radio Bearer Service (mostly air interface) and Iu bearer service. For the 3G air interface, one can provide differentiated QoS via intelligent burst allocation scheme, adaptive spreading factor control and weighted fair queueing scheduling algorithms. Next, we discuss the requirements for the transport technologies in the radio access network to provide differentiated QoS to multiple classes of traffic. We discuss both ATM based and IP based transport solutions. Last but not least, we discuss how QoS mechanism is provided in the core network to ensure e2e quality of service requirements. We discuss how mobile terminals that use RSVP as QoS signaling mechanisms can be are supported in the 3G network which may implement only IETF diffserv mechanism. . We discuss how one can map UMTS QoS classes with IETF diffserv code points. We also discuss 2G/3G handover scenarios and how the 2G/3G QoS parameters can be mapped.

  2. Power consumption analysis of constant bit rate data transmission over 3G mobile wireless networks

    DEFF Research Database (Denmark)

    Wang, Le; Ukhanova, Ann; Belyaev, Evgeny

    2011-01-01

    This paper presents the analysis of the power consumption of data transmission with constant bit rate over 3G mobile wireless networks. Our work includes the description of the transition state machine in 3G networks, followed by the detailed energy consumption analysis and measurement results of...... the radio link power consumption. Based on these description and analysis, we propose power consumption model. The power model was evaluated on the smartphone Nokia N900, which follows a 3GPP Release 5 and 6 supporting HSDPA/HSPA data bearers. Further we propose method of parameters selection for 3GPP...

  3. Towards adaptive security for convergent wireless sensor networks in beyond 3G environments

    DEFF Research Database (Denmark)

    Mitseva, Anelia; Aivaloglou, Efthimia; Marchitti, Maria-Antonietta;

    2010-01-01

    The integration of wireless sensor networks with different network systems gives rise to many research challenges to ensure security, privacy and trust in the overall architecture. The main contribution of this paper is a generic security, privacy and trust framework providing context......-aware adaptability, flexibility and scalability which allows customisation of wireless sensor networks to a diverse set of application spaces. Suitable protocols and mechanisms are identified, which when combined according to the framework form a complete toolbox solution which fits the architecture of Beyond 3G...... environments. Performance evaluation results demonstrate the feasibility and estimate the benefits of the security framework for a variety of scenarios. Copyright (C) 2008 John Wiley & Sons, Ltd....

  4. Transcoding-Based Error-Resilient Video Adaptation for 3G Wireless Networks

    Directory of Open Access Journals (Sweden)

    Dogan Safak

    2007-01-01

    Full Text Available Transcoding is an effective method to provide video adaptation for heterogeneous internetwork video access and communication environments, which require the tailoring (i.e., repurposing of coded video properties to channel conditions, terminal capabilities, and user preferences. This paper presents a video transcoding system that is capable of applying a suite of error resilience tools on the input compressed video streams while controlling the output rates to provide robust communications over error-prone and bandwidth-limited 3G wireless networks. The transcoder is also designed to employ a new adaptive intra-refresh algorithm, which is responsive to the detected scene activity inherently embedded into the video content and the reported time-varying channel error conditions of the wireless network. Comprehensive computer simulations demonstrate significant improvements in the received video quality performances using the new transcoding architecture without an extra computational cost.

  5. Call Admission Control performance model for Beyond 3G Wireless Networks

    Directory of Open Access Journals (Sweden)

    Ramesh Babu H.S

    2009-12-01

    Full Text Available The Next Generation Wireless Networks (NGWN will be heterogeneous in nature where the different Radio Access Technologies (RATs operate together .The mobile terminals operating in this heterogeneous environment will have different QoS requirements to be handled by the system. These QoS requirements are determined by a set of QoS parameters. The radio resource management is one of the key challenges in NGWN.Call admission control is one of the radio resource management technique plays instrumental role in ensure the desired QoS to the users working on different applications which have diversified QoS requirements from the wireless networks . The call blocking probability is one such QoS parameter for the wireless network. For better QoS it is desirable to reduce the call blocking probability. In this customary scenario it is highly desirable to obtain analytic Performance model. In this paper we propose a higher order Markov chain based performance model for call admission control in a heterogeneous wireless network environment. In the proposed algorithm we have considered three classes of traffic having different QoS requirements and we have considered the heterogeneous network environment which includes the RATs that can effectively handle applications like voice calls, Web browsing and file transfer applications which are with varied QoS parameters. The paper presents the call blocking probabilities for all the three types of traffic both for fixed and varied traffic scenario.Keywords: Radio Access Technologies; Call admission control; Call blocking probability; Markov model; Heterogeneous wireless Networks.

  6. Call Admission Control performance model for Beyond 3G Wireless Networks

    CERN Document Server

    Babu, H S Ramesh; Satyanarayana, P S

    2010-01-01

    The Next Generation Wireless Networks (NGWN) will be heterogeneous in nature where the different Radio Access Technologies (RATs) operate together .The mobile terminals operating in this heterogeneous environment will have different QoS requirements to be handled by the system. These QoS requirements are determined by a set of QoS parameters. The radio resource management is one of the key challenges in NGWN. Call admission control is one of the radio resource management technique plays instrumental role in ensure the desired QoS to the users working on different applications which have diversified QoS requirements from the wireless networks . The call blocking probability is one such QoS parameter for the wireless network. For better QoS it is desirable to reduce the call blocking probability. In this customary scenario it is highly desirable to obtain analytic Performance model. In this paper we propose a higher order Markov chain based performance model for call admission control in a heterogeneous wireles...

  7. The Research on Handoff Strategy in Beyond 3G Wireless Networks

    Institute of Scientific and Technical Information of China (English)

    CUI Hong-yan; TIAN Hui; XU Hai-bo; ZHANG Ping

    2006-01-01

    One of the major challenges for beyond third generation mobile systems is efficient mobility management. This paper proposes a distributed dynamic management scheme of handoff based on B3G networks. This .scheme can reduce the co.st of update signalling and transmitting packets, and improve the system capability. In this .scheme, the dynamic building network approach is adopted to deduce the update signalling cost. We implement the distributed dynamic management scheme of handoff in a simulation platform and compare its performance with that of general centralized handoff management schemes. Our simulation results indicate that our .scheme is capable of reducing the update handoff latency, and enhancing the performance.

  8. Improving Throughput and Delay by Signaling Modification in Integrated 802.11 and 3G Heterogeneous Wireless Network

    Directory of Open Access Journals (Sweden)

    Majid Fouladian

    2016-02-01

    Full Text Available Current trends show that UMTS network and WLAN will co-exist and work together to support more users with higher data rate services over a wider area. However, this integration invokes many challenges such as mobility management and handoff decision making. Vertical handoff is switching process between heterogeneous wireless networks in a 3G/WLAN network. Vertical handoffs often fail due to the abrupt degrade of the WLAN signal strength. In this paper, proposed a new vertical handoff method for to decrease the number of signaling and registration processes, to examine the Special conditions such as WLAN black holes and to eliminate disconnecting effects. By estimating user locations related to WLAN position, interface on-times will be reduced which makes the power consuming of the system decreased. To indicate the efficiency of proposed approach the performance and the delay results are simulated.

  9. Design and Development of Broadband Inverted E-shaped Patch Microstrip Array Antenna For 3G Wireless Network

    Directory of Open Access Journals (Sweden)

    Norbahiah Misran

    2008-01-01

    Full Text Available Microstrip patch antenna has been received tremendous attention since the last two decades and now it becomes a major component in the development of Smart Antenna System for Third-Generation Wireless Network proposed by the ITU-R under the banner of IMT-2000. Smart antenna consists of an array of antennas associated with it a base-band hardware and control unit (inclusive of the software algorithm that have the capability to change its radiation pattern according to the direction of the user. This paper describes the design and development of broadband Inverted E-shaped patch microstrip array antennas for 3G wireless network. The antenna was designed for the IMT-2000 operating frequency range of 1.885–2.200GHz and was built as an array of 4x4 inverted E-shaped patches. The beamforming feed network comprises of commercial variable attenuators (KAT1D04SA002, variable phase shifters (KPH35OSC000, and the corporate 16-ways Wilkinson power divider which was developed in-house. The antenna successfully achieves the bandwidth of 16.14% (at VSWR: 1.5 with respect to the center frequency of 2.045 GHz. The antenna is capable of scanning with the maximum scanning angle of ±30º and ±25º in azimuth and elevation respectively.

  10. Design considerations and implementation of a cost-effective, portable remote monitoring unit using 3G wireless data networks.

    Science.gov (United States)

    Gupta, Shashank; Ganz, Aura

    2004-01-01

    This paper describes the design and implementation of a light-weight, autonomous, patient-centric, portable medical unit that allows for anytime/anywhere monitoring and can find use in many monitoring scenarios like home-care, hospital wards, emergency help and disaster relief. The proposed unit called "TelePatient" achieves portability by exploiting a PDA and allows mobility through the use of cellular technology, enabling complete ubiquity. The design is based on open standards and is cost-effective. We incorporate transcoding software to fit data to limited bandwidth, as well as conserve energy on the power constrained PDA. We validate our design over real network 3G CDMA conditions and also test its use over WLAN802.11b, which can together cover a number of Telemedicine scenarios. PMID:17270983

  11. 3G无线网络条件下的用户行为分析%ANALYSING USERS BEHAVIOUR IN 3G WIRELESS NETWORKS

    Institute of Scientific and Technical Information of China (English)

    胡俊华; 魏芳; 平金玉

    2012-01-01

    With the rapid development of wireless communication technology and computer network technology, it becomes the urgent need for broad range of users to fast and effectively access the internet with mobile portable devices, and the acquaintance and analysis on the behaviour pattern of wireless network user becomes very necessary. In this paper we record the data of users in a residential zone who surfing internet through 3G wireless network,the processed data is used as the basis to estimate the relations between the data and to derive potential relationship of time-varied network traffic,IP number and user number, then further work out the active index which reflects the behaviour habit of wireless internet users. The analyses results provide the base in data for the amelioration and improvement of performance of wireless internet as well as for the reasonable decision of wireless network service provider,therefore have significant commercial value.%随着无线通信技术和计算机网络技术的快速发展,通过移动手持设备快速有效地接入互联网成为广大用户的迫切需求,了解和分析无线用户的行为模式显得十分必要.对一个小区内通过3G无线上网用户的数据进行记录,处理后以此为基础估计数据之间的关系,得出流量、IP数和用户数之间随着时间变化的潜在关系,进一步得出反映无线互联网用户行为习惯的活跃指数.分析结果为无线互联网的性能的改进和提高,以及无线网络服务商合理决策提供了数据依据,具有重要的商业价值.

  12. Wireless Networks

    OpenAIRE

    Samaka, Mohammed; Khan, Khaled M.D.

    2007-01-01

    Wireless communication is the fastest-growing field in the telecommunication industry. Wireless networks have grown significantly as an important segment of the communications industry. They have become popular networks with the potential to provide high-speed, high-quality information exchange between two or more portable devices without any wire or conductors. Wireless networks can simply be characterized as the technology that provides seamless access to information, anywhere, anyplace, an...

  13. Prototyping Neuroadaptive Smart Antenna for 3G Wireless Communications

    Directory of Open Access Journals (Sweden)

    To William

    2005-01-01

    Full Text Available This paper describes prototyping of a neuroadaptive smart antenna beamforming algorithm using hardware-software implemented RBF neural network and FPGA system-on-programmable-chip (SoPC approach. The aim is to implement the adaptive beamforming unit in a combination of hardware and software by estimating its performance against the fixed real-time constraint based on IMT-2000 family of 3G cellular communication standards.

  14. Application of VPDN Technology Based on 3G Wireless Network in Hainan Meteorological Operation%基于3G无线网络的VPDN技术在海南气象业务中的应用

    Institute of Scientific and Technical Information of China (English)

    王旭; 梁宝龙

    2013-01-01

    通过分析气象业务时效性强、7×24 h不间断运行的特点,结合海南气象网络结构的现状,充分挖掘无线网络的功能,深入研究基于3G的VPDN技术作为现有地面宽带的备份手段,规划设计了基于3G的VPDN线路备份方案,实现了具有高可用性的省-市县气象网络。详细阐述了组网方式和设备的功用,并给出了关键配置代码。该网络已经投入业务运行1年,无论是在日常业务中还是在重大气象保障中都取得了良好的效果。%By analyzing meteorological operation characteristic of strong timeliness and 7 ×24 h continuous running, combining with the situation of Hainan province meteorological network structure, the paper fully taps the function of wireless network, further studys the backup means of ground surface broadband based on 3G VPDN technology, plans and designs the VPDN line backup programs based on 3G, achieves high availability of province-city and county meteorological network. The paper elaborates network way and equipment function, and gives key configuration code. The network has already putted into operation one year, no matter daily business or major meteorological security, the network achieves good results.

  15. Emerging wireless networks concepts, techniques and applications

    CERN Document Server

    Makaya, Christian

    2011-01-01

    An authoritative collection of research papers and surveys, Emerging Wireless Networks: Concepts, Techniques, and Applications explores recent developments in next-generation wireless networks (NGWNs) and mobile broadband networks technologies, including 4G (LTE, WiMAX), 3G (UMTS, HSPA), WiFi, mobile ad hoc networks, mesh networks, and wireless sensor networks. Focusing on improving the performance of wireless networks and provisioning better quality of service and quality of experience for users, it reports on the standards of different emerging wireless networks, applications, and service fr

  16. Research on customer maintain service system based on 3G wireless communication network%基于3G无线通信网络的用户维系服务系统研究

    Institute of Scientific and Technical Information of China (English)

    吕威

    2012-01-01

    随着中国电信行业的不断发展,电信企业竞争由质量相当的网络资源转移到差异化的服务竞争,提高客户满意度和维系客户关系成为提升企业核心竞争力的有效手段之一.基于此提出了一种新的基于3G无线通信网络的用户维系服务系统架构,并基于此架构,提出了用户维系服务系统的主要功能设计思路,为电信运营商在新的3G业务模式下有效开展用户服务维系,进行了有益的探索和尝试.%With the development of China Telecom Industry, the competition in the telecommunications enterprises has been shifted from comparative quality in the usage pf network resources to differentiated quality of customer services. Improving customer satisfaction and maintaining customer relationships has become one of the effective means to enhance the core competitiveness of enterprises. To this issue, this paper proposed a new service system framework based on 3G wireless communication network for maintaining customer relationships and analyses the design ideas for the main function modes in the proposed scheme, which is benefit for telecommunications enterprises to develop the custom service under the business model with 3G.

  17. Future mobile networks 3G and beyond

    CERN Document Server

    Clapton, Alan

    2001-01-01

    This book explores the future of mobile communications networks given the increasing demands for services and higher quality, as well as the continued growth in the cellular mobile marketplace and the new private mobile radio systems. These demands will impact on the developments that are likely to occur in the near future which will continue to drive forward the technological capabilities. This book investigates the implications of increasing mobile customer numbers on a global scale, and the convergence of mobile and the internet, which, it is envisaged, will provide the next massive growth

  18. Security Issues and Solutions in 3G Core Network

    Directory of Open Access Journals (Sweden)

    Xuena Peng

    2011-05-01

    Full Text Available Nowadays, the 3G network plays a very important role in mobile communication system. But the security concern of such network, especially the core network, is far from being satisfied. With the continuously development in the security enhancement in RAN, core network would become the future target of attackers. GPRS Tunnel Protocol (GTP, which is one of the key protocols in the core network, is quite vulnerable to attacks in the flat, full IP environment. Therefore solving such problem properly is very urgent and important for the operation of 3G network. In this paper, the security challenges in the 3G core network and the security issues in GTP are discussed, a defense solution for these security threats and an event-based description language are proposed. The experiment result shows the potential of our solution.

  19. Community Wireless Networks

    Science.gov (United States)

    Feld, Harold

    2005-01-01

    With increasing frequency, communities are seeing the arrival of a new class of noncommercial broadband providers: community wireless networks (CWNs). Utilizing the same wireless technologies that many colleges and universities have used to create wireless networks on campus, CWNs are creating broadband access for free or at costs well below…

  20. Feasibility Study on a Portable Field Pest Classification System Design Based on DSP and 3G Wireless Communication Technology

    OpenAIRE

    Fei Liu; Ruizhen Han; Yong He

    2012-01-01

    This paper presents a feasibility study on a real-time in field pest classification system design based on Blackfin DSP and 3G wireless communication technology. This prototype system is composed of remote on-line classification platform (ROCP), which uses a digital signal processor (DSP) as a core CPU, and a host control platform (HCP). The ROCP is in charge of acquiring the pest image, extracting image features and detecting the class of pest using an Artificial Neural Network (ANN) classif...

  1. Wireless mesh networks

    CERN Document Server

    Held, Gilbert

    2005-01-01

    Wireless mesh networking is a new technology that has the potential to revolutionize how we access the Internet and communicate with co-workers and friends. Wireless Mesh Networks examines the concept and explores its advantages over existing technologies. This book explores existing and future applications, and examines how some of the networking protocols operate.The text offers a detailed analysis of the significant problems affecting wireless mesh networking, including network scale issues, security, and radio frequency interference, and suggests actual and potential solutions for each pro

  2. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  3. Minimizing SIP Session Re-Setup Delay over Wireless Link in 3G Handover Scenarios

    Directory of Open Access Journals (Sweden)

    Moon Bongkyo

    2010-01-01

    Full Text Available The delay in transmitting SIP messages over the wireless link for session resetup at handover is still major bottleneck for interactive multimedia service. In this paper, a proxy agent-based scheme is proposed to minimize the SIP session setup delay over a wireless link in 3G inter-subnet handover scenarios. This scheme is based on the two characteristics. One is that the major factor of SIP session re-setup delay is generally caused by the retransmissions in the unreliable wireless links, and the other is that most of the fields in request messages as well as response messages are duplicated when a set of SIP messages are exchanged during session re-setup procedure. In this scheme, no change is required in the SIP message processing except for the proxy agents in both BS and MH.

  4. Wireless rechargeable sensor networks

    CERN Document Server

    Yang, Yuanyuan

    2015-01-01

    This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability

  5. Wireless network pricing

    CERN Document Server

    Huang, Jianwei

    2013-01-01

    Today's wireless communications and networking practices are tightly coupled with economic considerations, to the extent that it is almost impossible to make a sound technology choice without understanding the corresponding economic implications. This book aims at providing a foundational introduction on how microeconomics, and pricing theory in particular, can help us to understand and build better wireless networks. The book can be used as lecture notes for a course in the field of network economics, or a reference book for wireless engineers and applied economists to understand how pricing

  6. Power consumption analysis of constant bit rate video transmission over 3G networks

    DEFF Research Database (Denmark)

    Ukhanova, Ann; Belyaev, Evgeny; Wang, Le;

    2012-01-01

    This paper presents an analysis of the power consumption of video data transmission with constant bit rate over 3G mobile wireless networks. The work includes the description of the radio resource control transition state machine in 3G networks, followed by a detailed power consumption analysis...... and measurements of the radio link power consumption. Based on this description and analysis, we propose our power consumption model. The power model was evaluated on a smartphone Nokia N900, which follows 3GPP Release 5 and 6 supporting HSDPA/HSUPA data bearers. We also propose a method for parameter selection...... for the 3GPP transition state machine that allows to decrease power consumption on a mobile device taking signaling traffic, buffer size and latency restrictions into account. Furthermore, we discuss the gain in power consumption vs. PSNR for transmitted video and show the possibility of performing power...

  7. Architecture of Wireless Network

    Directory of Open Access Journals (Sweden)

    Ram Kumar Singh

    2012-03-01

    Full Text Available To allow for wireless communications among a specific geographic area, an base stations of communication network must be deployed to allow sufficient radio coverage to every mobile users. The base stations, successively, must be linked to a central hub called the MSC (mobile switching centre. The mobile switching centre allow connectivity among the PSTN (public switched telephone network and the numerous wireless base stations, and finally among entirely of the wireless subscribers in a system. The global telecommunications control grid of PSTN which associate with conventional (landline telephone switching centre (called central office with MSCs all around the world.

  8. Sustainable wireless networks

    CERN Document Server

    Zheng, Zhongming; Xuemin

    2013-01-01

    This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy. The characteristics of green energy and investigating existing energy-efficient green approaches for wireless networks with sustainable energy is covered in the first part of this brief. The book then addresses the random availability and capacity of the energy supply. The authors explore how to maximize the energy sustainability of the network and minimize the failure probability that the mesh access points (APs) could deplete their

  9. Feasibility Study on a Portable Field Pest Classification System Design Based on DSP and 3G Wireless Communication Technology

    Directory of Open Access Journals (Sweden)

    Fei Liu

    2012-03-01

    Full Text Available This paper presents a feasibility study on a real-time in field pest classification system design based on Blackfin DSP and 3G wireless communication technology. This prototype system is composed of remote on-line classification platform (ROCP, which uses a digital signal processor (DSP as a core CPU, and a host control platform (HCP. The ROCP is in charge of acquiring the pest image, extracting image features and detecting the class of pest using an Artificial Neural Network (ANN classifier. It sends the image data, which is encoded using JPEG 2000 in DSP, to the HCP through the 3G network at the same time for further identification. The image transmission and communication are accomplished using 3G technology. Our system transmits the data via a commercial base station. The system can work properly based on the effective coverage of base stations, no matter the distance from the ROCP to the HCP. In the HCP, the image data is decoded and the pest image displayed in real-time for further identification. Authentication and performance tests of the prototype system were conducted. The authentication test showed that the image data were transmitted correctly. Based on the performance test results on six classes of pests, the average accuracy is 82%. Considering the different live pests’ pose and different field lighting conditions, the result is satisfactory. The proposed technique is well suited for implementation in field pest classification on-line for precision agriculture.

  10. Feasibility study on a portable field pest classification system design based on DSP and 3G wireless communication technology.

    Science.gov (United States)

    Han, Ruizhen; He, Yong; Liu, Fei

    2012-01-01

    This paper presents a feasibility study on a real-time in field pest classification system design based on Blackfin DSP and 3G wireless communication technology. This prototype system is composed of remote on-line classification platform (ROCP), which uses a digital signal processor (DSP) as a core CPU, and a host control platform (HCP). The ROCP is in charge of acquiring the pest image, extracting image features and detecting the class of pest using an Artificial Neural Network (ANN) classifier. It sends the image data, which is encoded using JPEG 2000 in DSP, to the HCP through the 3G network at the same time for further identification. The image transmission and communication are accomplished using 3G technology. Our system transmits the data via a commercial base station. The system can work properly based on the effective coverage of base stations, no matter the distance from the ROCP to the HCP. In the HCP, the image data is decoded and the pest image displayed in real-time for further identification. Authentication and performance tests of the prototype system were conducted. The authentication test showed that the image data were transmitted correctly. Based on the performance test results on six classes of pests, the average accuracy is 82%. Considering the different live pests' pose and different field lighting conditions, the result is satisfactory. The proposed technique is well suited for implementation in field pest classification on-line for precision agriculture. PMID:22736996

  11. Wireless nanosensor network system

    Science.gov (United States)

    Oh, Sechang; Kwon, Hyukjun; Kegley, Lauren; Yoon, Hargsoon; Varadan, Vijay K.

    2009-03-01

    Many types of wireless modules are being developed to enhance wireless performance with low power consumption, compact size, high data rates, and wide range coverage. However trade-offs must be taken into consideration in order to satisfy all aspects of wireless performance. For example, in order to increase the data rate and wide range coverage, power consumption should be sacrificed. To overcome these drawbacks, the paper presents a wireless client module which offers low power consumption along with a wireless receiver module that has the strength to provide high data rates and wide range coverage. Adopting Zigbee protocol in the wireless client module, the power consumption performance is enhanced so that it plays a part of the mobile device. On the other hand, the wireless receiver module, as adopting Zigbee and Wi-Fi protocol, provides high data rate, wide range coverage, and easy connection to the existing Internet network so that it plays a part of the portable device. This module demonstrates monitoring of gait analysis. The results show that the sensing data being measured can be monitored in any remote place with access to the Internet network.

  12. Energy efficiency in wireless networks

    CERN Document Server

    Jumira, Oswald

    2013-01-01

    The last decade has witnessed an unprecedented development and growth in global wireless communications systems, technologies and network "traffic" generated over network infrastructures.This book presents state-of-the-art energy-efficient techniques, designs and implementations that pertain to wireless communication networks such as cellular networks, wireless local area networks (WLANs) and wireless ad hoc networks (WAHNs) including mobile ad hoc networks (MANETs), and wireless sensor networks (WSNs) as they are deployed across the world to facilitate "always on" reliable high-speed

  13. Miniaturized wireless sensor network

    CERN Document Server

    Lecointre, Aubin; Dubuc, David; Katia, Grenier; Patrick, Pons; Aubert, Hervé; Muller, A; Berthou, Pascal; Gayraud, Thierry; Plana, Robert

    2010-01-01

    This paper addresses an overview of the wireless sensor networks. It is shown that MEMS/NEMS technologies and SIP concept are well suited for advanced architectures. It is also shown analog architectures have to be compatible with digital signal techniques to develop smart network of microsystem.

  14. Wireless Sensors Network (Sensornet)

    Science.gov (United States)

    Perotti, J.

    2003-01-01

    The Wireless Sensor Network System presented in this paper provides a flexible reconfigurable architecture that could be used in a broad range of applications. It also provides a sensor network with increased reliability; decreased maintainability costs, and assured data availability by autonomously and automatically reconfiguring to overcome communication interferences.

  15. Wireless networked music performance

    CERN Document Server

    Gabrielli, Leonardo

    2016-01-01

    This book presents a comprehensive overview of the state of the art in Networked Music Performance (NMP) and a historical survey of computer music networking. It introduces current technical trends in NMP and technical issues yet to be addressed. It also lists wireless communication protocols and compares these to the requirements of NMP. Practical use cases and advancements are also discussed.

  16. Wireless networks; Traadloese nettverk

    Energy Technology Data Exchange (ETDEWEB)

    2008-07-01

    Wireless Local Area Networks - WLAN, is being installed in homes, offices, schools and city areas with an increasing speed. Computers communicate with each other through networks by using radio signals. Base stations make sure there is sufficient radio coverage in the current areas. The effects on human and if it is dangerous is discussed

  17. Evolution of Heterogeneous Wireless Networks

    DEFF Research Database (Denmark)

    Zhang, Q.; Fitzek, Frank; Katz, Marcos

    2006-01-01

    Mobile and wireless content, services and networks - Short-term and long-term development trends......Mobile and wireless content, services and networks - Short-term and long-term development trends...

  18. Security Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network

    CERN Document Server

    Shankar, R; Dananjayan, P; 10.5121/iju.2010.1303

    2010-01-01

    The third generation partnership project (3GPP) has addressed the feasibility of interworking and specified the interworking architecture and security architecture for third generation (3G)-wireless local area network (WLAN), it is developing, system architecture evolution (SAE)/ long term evolution (LTE) architecture, for the next generation mobile communication system. To provide a secure 3G-WLAN interworking in the SAE/LTE architecture, Extensible authentication protocol-authentication and key agreement (EAP-AKA) is used. However, EAP-AKA have several vulnerabilities. Therefore, this paper not only analyses the threats and attacks in 3G-WLAN interworking but also proposes a new authentication and key agreement protocol based on EAP-AKA. The proposed protocol combines elliptic curve Diffie-Hellman (ECDH) with symmetric key cryptosystem to overcome the vulnerabilities. The proposed protocol is used in hybrid coupled 3G-WLAN convergence network to analyse its efficiency in terms of QoS metrics, the results ob...

  19. Insecurity of Wireless Networks

    Energy Technology Data Exchange (ETDEWEB)

    Sheldon, Frederick T [ORNL; Weber, John Mark [Dynetics, Inc.; Yoo, Seong-Moo [University of Alabama, Huntsville; Pan, W. David [University of Alabama, Huntsville

    2012-01-01

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA, allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.

  20. Cognitive wireless networks

    CERN Document Server

    Feng, Zhiyong; Zhang, Ping

    2015-01-01

    This brief examines the current research in cognitive wireless networks (CWNs). Along with a review of challenges in CWNs, this brief presents novel theoretical studies and architecture models for CWNs, advances in the cognitive information awareness and delivery, and intelligent resource management technologies. The brief presents the motivations and concepts of CWNs, including theoretical studies of temporal and geographic distribution entropy as well as cognitive information metrics. A new architecture model of CWNs is proposed with theoretical, functional and deployment architectures suppo

  1. Wireless Sensor Network Topology Control

    OpenAIRE

    Zuk, Olexandr; Romanjuk, Valeriy; Sova, Oleg

    2010-01-01

    Topology control process for the wireless sensor network is considered. In this article the use of rule base for making decision on the search of optimum network topology is offered for the realization of different aims of network management.

  2. 78 FR 42107 - Certain Wireless Devices With 3G Capabilities and Components Thereof; Notice of Request for...

    Science.gov (United States)

    2013-07-15

    ... certain wireless devices with 3G capabilities and components thereof imported by respondents Huawei Technologies Co., Ltd. of Shenzhen, China; FutureWei Technologies, Inc. d/b/a Huawei, Technologies (USA) of Plano, Texas; Huawei Device USA, Inc. of Plano, Texas (``Huawei Device''); Nokia Corporation of...

  3. Wireless Networks: New Meaning to Ubiquitous Computing.

    Science.gov (United States)

    Drew, Wilfred, Jr.

    2003-01-01

    Discusses the use of wireless technology in academic libraries. Topics include wireless networks; standards (IEEE 802.11); wired versus wireless; why libraries implement wireless technology; wireless local area networks (WLANs); WLAN security; examples of wireless use at Indiana State University and Morrisville College (New York); and useful…

  4. Views of wireless network systems.

    Energy Technology Data Exchange (ETDEWEB)

    Young, William Frederick; Duggan, David Patrick

    2003-10-01

    Wireless networking is becoming a common element of industrial, corporate, and home networks. Commercial wireless network systems have become reliable, while the cost of these solutions has become more affordable than equivalent wired network solutions. The security risks of wireless systems are higher than wired and have not been studied in depth. This report starts to bring together information on wireless architectures and their connection to wired networks. We detail information contained on the many different views of a wireless network system. The method of using multiple views of a system to assist in the determination of vulnerabilities comes from the Information Design Assurance Red Team (IDART{trademark}) Methodology of system analysis developed at Sandia National Laboratories.

  5. Wireless sensor networks architectures and protocols

    CERN Document Server

    Callaway, Jr, Edgar H

    2003-01-01

    Introduction to Wireless Sensor NetworksApplications and MotivationNetwork Performance ObjectivesContributions of this BookOrganization of this BookThe Development of Wireless Sensor NetworksEarly Wireless NetworksWireless Data NetworksWireless Sensor and Related NetworksConclusionThe Physical LayerSome Physical Layer ExamplesA Practical Physical Layer for Wireless Sensor NetworksSimulations and ResultsConclusionThe Data Link LayerMedium Access Control TechniquesThe Mediation DeviceSystem Analysis and SimulationConclusionThe Network LayerSome Network Design ExamplesA Wireless Sensor Network De

  6. Wireless Internet over Heterogeneous Wireless Networks

    NARCIS (Netherlands)

    Wu, G.; Mizuno, M.

    2001-01-01

    One of the two keywords for the next generation wireless communications is seamless. Being involved in the essential e-Japan Plan promoted by the Japanese Government, the MIRAI (Multimedia Integrated network by Radio Access Innovation) project is responsible for the research and development on the s

  7. Rate allocation strategies for energy-efficient multipath routing in Ad-hoc networks towards B3G

    Institute of Scientific and Technical Information of China (English)

    ZHAN Song-tao; XU Guo-xin

    2007-01-01

    Wireless mobile Ad-hoc network is a special network that all nodes can self-organize and work together. It is flexible to form a network and extend the coverage area dynamically without infrastructure, so Ad-hoc network is envisioned as cornerstones of future generation networking technologies (B3G or 4G). However, the dynamic network topology makes the communication cost not only the energy of source/destination nodes, but also the relay nodes. Another problem of the Ad-hoc network is it is hard to provide a stable and persistent quality of service (QoS), which is strongly required by the beyond 3rd generation (B3G) system. In this article, the authors establish a scenario that contains B3G cellular base station and Ad-hoc mobile nodes, and propose two algorithms minimum incremental rate algorithm and power feed-back rate allocation algorithm in multipath routing. The algorithms can maintain a constant total transmission rate and bit error ratio (BER) to provide the QoS guarantee and reach the minimum power consumption of the relay nodes by adjusting the rate of each path in the multipath routing.

  8. Wi-Fi Wireless Networks and Technology

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Most agree that wireless networking represent the future of computer and Internet connectivity worldwide.Wi-Fi continues to be the pre-eminent technology for building general-purpose wireless networks. 1 What is Wireless Networking? Wireless networks utilize radio waves and/or microwaves to maintain communication channels between computers.Wireless net- working is a more modern alternative to wired networking that relies on copper and/or fiber optic cabling between network devices.

  9. Building RNC in All-IP Wireless Networks using Network Processors

    Institute of Scientific and Technical Information of China (English)

    CHENG Sheng; NI Xian-le; ZHU Xin-ning; DING Wei

    2004-01-01

    This paper describes a solution to build network-processor-based Radio Network Controller (RNC) in all-IP wireless networks, it includes the structure of the 3rd Generation (3G) wireless networks and the role of network nodes, such as Base Station (BS), RNC, and Packet-Switched Core Networks (PSCN). The architecture of IXP2800 network processor; the detailed implementation of the solution on IXP2800-based RNC are also covered. This solution can provide scalable IP forward features and it will be widely used in 3G RNCs.

  10. Wireless home networking for dummies

    CERN Document Server

    Briere, Danny; Ferris, Edward

    2010-01-01

    The perennial bestseller shows you how share your files and Internet connection across a wireless network. Fully updated for Windows 7 and Mac OS X Snow Leopard, this new edition of this bestseller returns with all the latest in wireless standards and security. This fun and friendly guide shows you how to integrate your iPhone, iPod touch, smartphone, or gaming system into your home network. Veteran authors escort you through the various financial and logisitical considerations that you need to take into account before building a wireless network at home.: Covers the basics of planning, instal

  11. Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Hong-Chuan Yang

    2007-01-01

    Full Text Available We study the energy-efficient configuration of multihop paths with automatic repeat request (ARQ mechanism in wireless ad hoc networks. We adopt a cross-layer design approach and take both the quality of each radio hop and the battery capacity of each transmitting node into consideration. Under certain constraints on the maximum tolerable transmission delay and the required packet delivery ratio, we solve optimization problems to jointly schedule the transmitting power of each transmitting node and the retransmission limit over each hop. Numerical results demonstrate that the path configuration methods can either significantly reduce the average energy consumption per packet delivery or considerably extend the average lifetime of the multihop route.

  12. Guide to wireless network security

    CERN Document Server

    Vacca, John R

    2006-01-01

    A guide to key foundation topics and technology frameworks for designing and maintaining reliable operations. This work explains the concepts from basic concepts to designing principles to deployment. It covers wireless security testing techniques and prevention techniques for intrusion. It is aimed at wireless network administrators.

  13. Wireless network security theories and applications

    CERN Document Server

    Chen, Lei; Zhang, Zihong

    2013-01-01

    Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth

  14. 3G, 4G and beyond bringing networks, devices and the web together

    CERN Document Server

    Sauter, Martin

    2012-01-01

    Extensively updated evaluation of current and future network technologies, applications and devices  This book follows on from its successful predecessor with an introduction to next generation network technologies, mobile devices, voice and multimedia services and the mobile web 2.0.  Giving a sound technical introduction to 3GPP wireless systems, this book explains the decisions taken during standardization of the most popular wireless network standards today, LTE, LTE-Advanced and HSPA+.  It discusses how these elements strongly influence each other and how network ca

  15. Wireless Sensor Networks: Issues & Challenges

    OpenAIRE

    Indu; Sunita Dixit

    2014-01-01

    Wireless Sensor Networks (WSN) are highly distributed self organized systems. The basic idea of sensor network is to disperse tiny sensing devices; which are capable of sensing some changes of incidents/parameters and communicating with other devices, spread over a specific geographic area for some specific purposes like environmental monitoring, surveillance, target tracking etc. By combining sensing technology with processing power and wireless communication makes it lucrative for being exp...

  16. Secure positioning in wireless networks

    DEFF Research Database (Denmark)

    Capkun, Srdjan; Hubaux, Jean-Pierre

    2006-01-01

    So far, the problem of positioning in wireless networks has been studied mainly in a non-adversarial settings. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call...... Verifiable Multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations....

  17. Wireless Internet on Heterogeneous Networks

    NARCIS (Netherlands)

    Wu, G.

    2001-01-01

    The wide proliferation of wireless systems and the use of software radio technologies enable the employment of a heterogeneous network. In this concept services are delivered via the network that is most efficient for that service. The solution is based on a common core network that interconnects ac

  18. Breaking Free with Wireless Networks.

    Science.gov (United States)

    Fleischman, John

    2002-01-01

    Discusses wireless local area networks (LANs) which typically consist of laptop computers that connect to fixed access points via infrared or radio signals. Topics include wide area networks; personal area networks; problems, including limitations of available bandwidth, interference, and security concerns; use in education; interoperability;…

  19. Radio propagation and adaptive antennas for wireless communication networks

    CERN Document Server

    Blaunstein, Nathan

    2014-01-01

    Explores novel wireless networks beyond 3G, and advanced 4G technologies, such as MIMO, via propagation phenomena and the fundamentals of adapted antenna usage.Explains how adaptive antennas can improve GoS and QoS for any wireless channel, with specific examples and applications in land, aircraft and satellite communications.Introduces new stochastic approach based on several multi-parametric models describing various terrestrial scenarios, which have been experimentally verified in different environmental conditionsNew chapters on fundamentals of wireless networks, cellular and non-cellular,

  20. Securing underwater wireless communication networks

    OpenAIRE

    Domingo Aladrén, Mari Carmen

    2011-01-01

    Underwater wireless communication networks are particularly vulnerable to malicious attacks due to the high bit error rates, large and variable propagation delays, and low bandwidth of acoustic channels. The unique characteristics of the underwater acoustic communication channel, and the differences between underwater sensor networks and their ground-based counterparts require the development of efficient and reliable security mechanisms. In this article, a compl...

  1. Rapid Industrial Prototyping and SoC Design of 3G/4G Wireless Systems Using an HLS Methodology

    Directory of Open Access Journals (Sweden)

    Cavallaro JosephR

    2006-01-01

    Full Text Available Many very-high-complexity signal processing algorithms are required in future wireless systems, giving tremendous challenges to real-time implementations. In this paper, we present our industrial rapid prototyping experiences on 3G/4G wireless systems using advanced signal processing algorithms in MIMO-CDMA and MIMO-OFDM systems. Core system design issues are studied and advanced receiver algorithms suitable for implementation are proposed for synchronization, MIMO equalization, and detection. We then present VLSI-oriented complexity reduction schemes and demonstrate how to interact these high-complexity algorithms with an HLS-based methodology for extensive design space exploration. This is achieved by abstracting the main effort from hardware iterations to the algorithmic C/C++ fixed-point design. We also analyze the advantages and limitations of the methodology. Our industrial design experience demonstrates that it is possible to enable an extensive architectural analysis in a short-time frame using HLS methodology, which significantly shortens the time to market for wireless systems.

  2. Mobility Management in beyond 3G-Environments

    NARCIS (Netherlands)

    Bargh, Mortaza S.; Bijwaard, Dennis; Zandbelt, Hans; Meeuwissen, Erik; Peddemors, Arjan

    2003-01-01

    Beyond 3G-environments are typically defined as environments that integrate different wireless and fixed access network technologies. In this paper, we address IP based Mobility Management (MM) in beyond 3G-environments with a focus on wireless access networks, motivated by the current trend of WiFi

  3. Design and security of small wireless network

    OpenAIRE

    Cikánek, Svatopluk

    2014-01-01

    This thesis deals with design and security of small wireless network. Main goal of the thesis is home network design and choice of optimal solution of wireless security. The thesis has four parts. The first part describes computer networks and network components in theory. Next part deals with network design, choosing of network components and setting of them. It also describes some functionalities of alternative firmware DD-WRT. The third part presents common wireless security and network an...

  4. Optimisation problems in wireless sensor networks

    OpenAIRE

    Suomela, Jukka

    2009-01-01

    This thesis studies optimisation problems related to modern large-scale distributed systems, such as wireless sensor networks and wireless ad-hoc networks. The concrete tasks that we use as motivating examples are the following: (i) maximising the lifetime of a battery-powered wireless sensor network, (ii) maximising the capacity of a wireless communication network, and (iii) minimising the number of sensors in a surveillance application. A sensor node consumes energy both when it is transmit...

  5. Achieving a Seamless Mobility in the 3G and WLAN Networks Integration when the WLAN AP is Tightly Coupled to the SGSN of the 3G Network

    Directory of Open Access Journals (Sweden)

    George Chukwudi Nganya

    2016-01-01

    Full Text Available The increase in demand for real-time applications such as video and audio streams data transfer has resulted in the need to find a means of managing the increasing numbers of users in the mobile wireless system without affecting the quality of service (QoS requirements. In their work, A. K. Salkintzis, C. Fors, and R. Pazhyannur, stated that one of the approaches to meeting the high user demands is to interwork two different but complementary networks, the Universal Mobile Telecommunication Systems (UMTS which has a high mobility but low-data rate circuit-switched and packet-switched services, and the Wireless Local Area Network (WLAN which has a high-data rate circuit-switched service but limited mobility coverage confined to a smaller area called the hot-spot [1]. The idea is to interwork the two networks such that seamless mobility could be achieved. In this paper, the tight coupling of the WLAN at the SGSN of the UMTS for the possibility of achieving a seamless mobility is examined. The performance of this integration approach is evaluated using this QoS parameters, namely buffer overflow, Ethernet delay, throughput and Ethernet load. A simulation of this integration approach using an OPNET Modeler 14.0 is performed and the simulation results analyzed. We performed a simulation of the WLAN AP tightly coupled to the SGSN node of the UMTS network. Also performed in this research are simulations of different scenarios of the tight coupling approach at the SGSN by varying the number of users in the integrated UMTS and WLAN network to show the effect the number of users connected to both networks has towards achieving seamless mobility in the interworked network. From our study review and the simulation results of this interworking approach, we propose that coupling the WLAN AP and the UMTS network at the SGSN of the UMTS, and using a suitable mobility protocol, has the possibility of providing a seamless mobility between these complementary

  6. Novel Concepts of Cooperative Wireless Networking

    DEFF Research Database (Denmark)

    Zhang, Qi

    2008-01-01

    Although wireless networks have achieved great success in the lastest two decades, the current wireless networks have difficulties to fulll users' ever-increasing expectations and needs. It is mainly due to available spectrum resource scarcity, limited battery capacity of wireless device......, unreliable wireless radio link, etc. To tackle these issues, a new telecommunication paradigm has been proposed, referred to as cooperative wireless networking [1]. The basic idea of cooperative wireless networking is that wireless devices work together to achieve their individual goals or one common goal...... and the concept of wireless device resource. It is promising to solve the crucial issues that cannot be easily tackled in conventional network architectures. Different cooperative strategies or schemes according to cooperation concept are proposed in the thesis to solve crucial issues in different wireless...

  7. A Perspective of 3G Construction in China

    Institute of Scientific and Technical Information of China (English)

    Beijing Norson Consulting Co.,Ltd

    2006-01-01

    @@ 1. The problems on hybrid network combining TD-SCDMA 1)Hybrid network is imperative in China At present, there are several major wireless networks in China,namely, GSM network of China Mobile, GSM network and CDMA network of China Unicom, PHS network of China Telecom and China Netcom, and therefore the seamless transition from the existent wireless network to 3G network is an inevitable factor must be taken into account. In view of the difference of release sequence and release target of 3G license, the hybrid network combining TD-SCDMA, WCDMA and CDMA2000 technology will be probably adopted in future 3G construction in China.

  8. Wireless wearable network and wireless body-centric network for future wearable computer

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    The wireless wearable network and wireless body-centric network can assistant to the user anywhere at anytime communicating with wireless components seamlessly. In this paper, the wireless wearable network and wireless body-centric network have been discussed, and the frequency band and human body effect has been estimated. The bluetooth and UWB technology can be used to construct the narrow band and the broad band wireless wearable network and wireless body-centric network separately. Further, the narrow band wireless wearable network and wireless body-centric network based on bluetooth technology has been constructed by integrated planar inverted-F antenna and the communication channel character has been studied by measurement. The results can provide the possibility of producing a prototype radio system that can be integrated with the wearable computers by suitable wireless technologies developed and applied to facilitate a reliable and continuous connectivity between the system units.

  9. Active Intrusion Detection for Wireless Multihop Networks

    OpenAIRE

    do Carmo, Rodrigo Daniel

    2014-01-01

    This work focuses on network security and introduces an active-probing technique for intrusion detection in wireless multihop networks. Wireless networks have been the revolution of personal communications of the past decades. Millions of devices with wireless capabilities are sold to end customers every year: smartphones that enable access to the Internet almost everywhere, computers with wireless connections, personal watches, sports shoes, digital cameras, and even lenses with wirel...

  10. Centralized Routing for Prolonged Network Lifetime in Wireless Sensor Networks

    OpenAIRE

    Hansen, Ewa

    2008-01-01

    In this thesis centralized routing methods for wireless sensor networks have been studied. The aim has been to prolong network lifetime by reducing the energy consumed by sensor-node communication. Wireless sensor networks are rapidly becoming common in application areas where information from many sensors is to be collected and acted upon. The use of wireless sensor networks adds flexibility to the network, and the cost of cabling can be avoided. Wireless sensor networks may consist of sever...

  11. Gigabit Wireless for Network Connectivity

    Science.gov (United States)

    Schoedel, Eric

    2009-01-01

    Uninterrupted, high-bandwidth network connectivity is crucial for higher education. Colleges and universities increasingly adopt gigabit wireless solutions because of their fiber-equivalent performance, quick implementation, and significant return on investment. For just those reasons, Rush University Medical Center switched from free space optics…

  12. Security procedures in wireless networks

    Institute of Scientific and Technical Information of China (English)

    郑光

    2009-01-01

    In the paper, we will introduce the mechanisms and the weaknesses of the Wired Equivalent Privacy (WEP) and 802.1 li security procedures in the wireless networks. After that, the Wi-Fi Protected Access (WPA), a standards-based security mechanism that can eliminate most of 802.11 security problems will be introduced.

  13. Multihop Wireless Networks Opportunistic Routing

    CERN Document Server

    Zeng, Kai; Li, Ming

    2011-01-01

    This book provides an introduction to opportunistic routing an emerging technology designed to improve the packet forwarding reliability, network capacity and energy efficiency of multihop wireless networks This book presents a comprehensive background to the technological challenges lying behind opportunistic routing. The authors cover many fundamental research issues for this new concept, including the basic principles, performance limit and performance improvement of opportunistic routing compared to traditional routing, energy efficiency and distributed opportunistic routing protocol desig

  14. Secure data aggregation for wireless sensor network

    OpenAIRE

    Tran-Thi-Thuy, Trang

    2010-01-01

    Like conventional networks, security is also a big concern in wireless sensor networks. However, security in this type of networks faces not only typical but also new challenges. Constrained devices, changing topology or susceptibility to unprecedented security threats such as node capture and node compromise has refrained developers from applying conventional security solutions into wireless sensor networks. Hence, developing security solutions for wireless sensor networks not only requires...

  15. Integrated Optical Wireless Network For Next Generation Wireless Systems

    Directory of Open Access Journals (Sweden)

    Aditya Goel

    2009-03-01

    Full Text Available Next generation wireless networks need to support broadband wireless services at significantly reduced cost. The existing wireless systems can hardly provide transmission capacity of the order of few Mbps. However, millimeter waves and optical fiber can provide data capacity of the order of Gbps and Tbps respectively. Hence the requirements of broadband wireless system can be achieved through the integration of optical fiber and millimeter wireless systems. We suggest modified millimeter wireless system, with optical fiber as feeder network. Simulations have been carried out for AWGN and optical fiber channels using MATLAB code, so as to compare their individual performance. When compared it is observed that the performance of multimode optical fiber (MMOF link even for distance of 80 KM is better than that of the AWGN channel with SNR of 50 dB and above. Hence, an integrated fiber radio network is an excellent cost effective media for higher data rate (>100Mbps.

  16. Underwater optical wireless communication network

    Science.gov (United States)

    Arnon, Shlomi

    2010-01-01

    The growing need for underwater observation and subsea monitoring systems has stimulated considerable interest in advancing the enabling technologies of underwater wireless communication and underwater sensor networks. This communication technology is expected to play an important role in investigating climate change, in monitoring biological, biogeochemical, evolutionary, and ecological changes in the sea, ocean, and lake environments, and in helping to control and maintain oil production facilities and harbors using unmanned underwater vehicles (UUVs), submarines, ships, buoys, and divers. However, the present technology of underwater acoustic communication cannot provide the high data rate required to investigate and monitor these environments and facilities. Optical wireless communication has been proposed as the best alternative to meet this challenge. Models are presented for three kinds of optical wireless communication links: (a) a line-of-sight link, (b) a modulating retroreflector link, and (c) a reflective link, all of which can provide the required data rate. We analyze the link performance based on these models. From the analysis, it is clear that as the water absorption increases, the communication performance decreases dramatically for the three link types. However, by using the scattered light it was possible to mitigate this decrease in some cases. It is concluded from the analysis that a high-data-rate underwater optical wireless network is a feasible solution for emerging applications such as UUV-to-UUV links and networks of sensors, and extended ranges in these applications could be achieved by applying a multi-hop concept.

  17. Dynamic wireless sensor networks

    CERN Document Server

    Oteafy, Sharief M A

    2014-01-01

    In this title, the authors leap into a novel paradigm of scalability and cost-effectiveness, on the basis of resource reuse. In a world with much abundance of wirelessly accessible devices, WSN deployments should capitalize on the resources already available in the region of deployment, and only augment it with the components required to meet new application requirements. However, if the required resources already exist in that region, WSN deployment converges to an assignment and scheduling scheme to accommodate for the new application given the existing resources. Such resources are polled

  18. Wireless Sensor Networks for Healthcare Applications

    CERN Document Server

    Dishongh, Terrance J; Kuris, Ben

    2009-01-01

    This unique reference focuses on methods of application, validation and testing based on real deployments of sensor networks in the clinical and home environments. Key topics include healthcare and wireless sensors, sensor network applications, designs of experiments using sensors, data collection and decision making, clinical deployment of wireless sensor networks, contextual awareness medication prompting field trials in homes, social health monitoring, and the future of wireless sensor networks in healthcare.

  19. Tunneled data transmission over wireless sensor networks

    OpenAIRE

    Yow, Thiam Poh

    2007-01-01

    A technique for terminal communication through transmission links established across a wireless sensor network is developed and tested. Using protocols established for conventional wireless communication networks as a guiding principle, different methodologies for link management, and segmentation and reassembly of information are explored. A protocol for sensor network encapsulation was designed and implemented across a network of terminals and wireless sensor motes. The study concludes ...

  20. Sybil attack in Wireless Sensor Network

    OpenAIRE

    Abirami.K; Santhi.B

    2013-01-01

    Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for secur...

  1. Key Management in Wireless Sensor Networks

    OpenAIRE

    Ismail Mansour; Gérard Chalhoub; Pascal Lafourcade

    2015-01-01

    Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take cont...

  2. Sybil attack in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Abirami.K

    2013-04-01

    Full Text Available Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for security.

  3. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  4. R&D on wireless broadband communication systems: new generation ubiquitous mobile network

    Science.gov (United States)

    Ogawa, Hiroyo

    2007-09-01

    R&D on new generation mobile network has attracted a growing interest over the world on the background of rapid market growth for 2nd and 3rd - generation cellular networks and wireless LANs/MANs. The National Institute of Information and Communications Technology (NICT) has been carried out the New Generation Mobile Network Project from April 2002 to March 2006, and has developed fundamental technologies to enable seamless and secure integration of various wireless access networks such as existing cellular networks, wireless LANs, home networks, intelligent transport systems (ITS), the Beyond-3G (B3G) cellular and other wireless access systems. From April 2006, Ubiquitous Mobile Network project focused on cognitive radio technology and integrated seamless networking technology was started. This paper overviews the achievement and the future plan of these projects.

  5. Wireless Sensor Networks Approach

    Science.gov (United States)

    Perotti, Jose M.

    2003-01-01

    This viewgraph presentation provides information on hardware and software configurations for a network architecture for sensors. The hardware configuration uses a central station and remote stations. The software configuration uses the 'lost station' software algorithm. The presentation profiles a couple current examples of this network architecture in use.

  6. Capacity Limit, Link Scheduling and Power Control in Wireless Networks

    Science.gov (United States)

    Zhou, Shan

    2013-01-01

    The rapid advancement of wireless technology has instigated the broad deployment of wireless networks. Different types of networks have been developed, including wireless sensor networks, mobile ad hoc networks, wireless local area networks, and cellular networks. These networks have different structures and applications, and require different…

  7. Future wireless and optical networks

    CERN Document Server

    Jiang, Shengming

    2012-01-01

    This book reviews the challenges of all-optical and wireless networks for the future Internet, with a focus on cross-layer design and optimization. Features: presents a thorough introduction to major networking modes and their effect on Internet development; proposes a new structure favorable for all-optical packet switching; discusses a new quality of service (QoS) provisioning approach, which overcomes the scalability problem of IntServ and the coarse QoS granularity of DiffServ; describes the end-to-end arguments in Internet design, before investigating a solution to congestion control prob

  8. Security Threats in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sushma

    2011-05-01

    Full Text Available Wireless Sensor Network (WSN is an emergingtechnology that shows great promise for variousfuturistic applications both for mass public andmilitary. The sensing technology combined withprocessing power and wireless communication makesit lucrative for being exploited in abundance in future.Wireless sensor networks are characterized byseverely constrained computational and energy resources, and an ad hoc operational environment. Wireless sensor networks (WSN are currently receiving significant attention due to their unlimitedpotential. However, it is still very early in the lifetime of such systems and many research challenges exist. This paper studies the security aspects of these networks.

  9. Self Organizing Wireless Mesh Network

    Directory of Open Access Journals (Sweden)

    P. Sharnya

    2013-06-01

    Full Text Available A communication network with radio nodes which is organized in a mesh topology is called as wireless mesh network or WMN. They are used for variety application such as building automation, transportation, citywide wireless Internet services etc. The WMN experience link failure due to application bandwidth demands, channel interference etc. These failures will cause performance degradation. Reconfiguration is needed to preserve the network from dynamic link failure. The most of the existing algorithms are not able to give full improvement at the time of dynamic link failure. The resource allocation require global configuration changes, greedy channel assignment algorithm might not be able to realize full improvement. The proposed work is for reconfigure the network at the time of dynamic link failure. Autonomous reconfiguration system (ARS is used to reconfigure the network. The system generates necessary changes in channel assignment in order to recover from link failure. The performance is evaluated using different types of quality parameters such as throughput, PDR, delay. Comparing with existing schemes this will provide fast recovery.

  10. Evaluation of wireless local area networks

    OpenAIRE

    McBee, Charles L.

    1993-01-01

    Approved for public release; distribution is unlimited. This thesis is an in-depth evaluation of the current wireless Local Area Network (LAN) technologies. Wireless LANs consist of three technologies; they are infrared light, microwave, and spread spectrum. When the first wireless LANs were introduced, they were unfavorably labeled slow, expensive, and unreliable. The wireless LANs of today are competitively priced, more secure, easier to install, and provide equal to or greater than the ...

  11. The Evolution of IDS Solutions in Wireless Ad-Hoc Networks To Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Novarun Deb

    2011-12-01

    Full Text Available The domain of wireless networks is inherently vulnerable to attacks due to the unreliable wireless medium. Such networks can be secured from intrusions using either prevention or detection schemes. This paper focuses its study on intrusion detection rather than prevention of attacks. As attackers keep onimprovising too, an active prevention method alone cannot provide total security to the system. Here in lies the importance of intrusion detection systems (IDS that are solely designed to detect intrusions in real time. Wireless networks are broadly classified into Wireless Ad-hoc Networks (WAHNs, Mobile Adhoc Networks (MANETs, Wireless Sensor Networks (WSNs and the most recent Wireless Mesh Networks (WMNs. Several IDS solutions have been proposed for these networks. This paper is an extension to a survey of IDS solutions for MANETs and WMNs published earlier in the sense that the present survey offers a comparative insight of recent IDS solutions for all the sub domains of wireless networks.

  12. Programming Wireless Sensor Networks

    Science.gov (United States)

    Lopes, Luís; Martins, Francisco; Barros, João

    Sensor networks can be viewed as a collection of tiny, low-cost devices programmed to sense the physical world and that communicate over radio links [12]. The devices are commonly called motes or smart dust [676], in allusion to their computational and sensing capabilities, as well as their increasingly small size.

  13. Voice over IP in Wireless Heterogeneous Networks

    DEFF Research Database (Denmark)

    Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee

    The convergence of different types of traffic has preceded the convergence of systems and services in a wireless heterogeneous network. Voice and data traffic are usually treated separate in both 2G and 2.5G wireless networks. With advances in packet switching technology and especially...... with the deployment of wireless heterogeneous systems, both speech and data traffic are carrried over wireless links by the same IP-based packet-switched infrastructure. However, this combination faces some challenges due to the inherent properties of the wireless network. The requirements for good quality Vo......IP communications are difficult to achieve in a time-varying environment due to channel errors and traffic congestion and across different systems. The provision of VoIP in wireless heterogeneous networks requires a set of time-efficient control mechanisms to support a VoIP session with acceptable quality...

  14. Integration of RFID and Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    Miodrag; Bolic; Amiya; Nayak; Ivan; Stojmenovi.

    2007-01-01

    Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two important wireless technologies that have wide variety of applications and provide limitless future potentials. However,RFID and sensor networks almost are under development in parallel way. Integration of RFID and wireless sensor networks attracts little attention from research community. This paper first presents a brief introduction on RFID,and then investigates recent research works,new products/patents and applications that integrate RFID with sensor networks. Four types of integration are discussed. They are integrating tags with sensors,integrating tags with wireless sensor nodes,integrating readers with wireless sensor nodes and wire-less devices,and mix of RFID and sensors. New challenges and future works are discussed in the end.

  15. Low-Power Wireless Sensor Network Infrastructures

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg

    Advancements in wireless communication and electronics improving form factor and hardware capabilities has expanded the applicability of wireless sensor networks. Despite these advancements, devices are still limited in terms of energy which creates the need for duty-cycling and low-power protocols...... in order to achieve the wanted lifetimes. Through more than a decade of wireless sensor network research, progress towards realizing wanted lifetimes have been made and wireless standards for packet formatting and routing have been proposed. With standards in place, the wide-span between programming...... environments and communication primitives in wireless sensor network and traditional network development are closing. However, fundamental differences in wireless technology and energy constraints are still to be considered at the lower levels of the software stack. To fulfill energy requirements hardware...

  16. The Security of Wireless Local Area Network

    Institute of Scientific and Technical Information of China (English)

    林楠; 李翠霞

    2007-01-01

    The Wireless Local Area Network (WLAN) is a new and developing technology and the security problem is always important in all networks; therefore, the security problems will be discussed in this article. The article firstly introduces the history of development of IEEE 802.11 and provides an overview of the Wireless LAN. The architecture of WLAN will be referred in next. Finally, the further of the wireless LAN will be prospected by this article.

  17. Resilient Disaster Network Based on Software Defined Cognitive Wireless Network Technology

    Directory of Open Access Journals (Sweden)

    Goshi Sato

    2015-01-01

    Full Text Available In order to temporally recover the information network infrastructure in disaster areas from the Great East Japan Earthquake in 2011, various wireless network technologies such as satellite IP network, 3G, and Wi-Fi were effectively used. However, since those wireless networks are individually introduced and installed but not totally integrated, some of networks were congested due to the sudden network traffic generation and unbalanced traffic distribution, and eventually the total network could not effectively function. In this paper, we propose a disaster resilient network which integrates various wireless networks into a cognitive wireless network that users can use as an access network to the Internet at the serious disaster occurrence. We designed and developed the disaster resilient network based on software defined network (SDN technology to automatically select the best network link and route among the possible access networks to the Internet by periodically monitoring their network states and evaluate those using extended AHP method. In order to verify the usefulness of our proposed system, a prototype system is constructed and its performance is evaluated.

  18. Reliability of wireless sensor networks.

    Science.gov (United States)

    Dâmaso, Antônio; Rosa, Nelson; Maciel, Paulo

    2014-01-01

    Wireless Sensor Networks (WSNs) consist of hundreds or thousands of sensor nodes with limited processing, storage, and battery capabilities. There are several strategies to reduce the power consumption of WSN nodes (by increasing the network lifetime) and increase the reliability of the network (by improving the WSN Quality of Service). However, there is an inherent conflict between power consumption and reliability: an increase in reliability usually leads to an increase in power consumption. For example, routing algorithms can send the same packet though different paths (multipath strategy), which it is important for reliability, but they significantly increase the WSN power consumption. In this context, this paper proposes a model for evaluating the reliability of WSNs considering the battery level as a key factor. Moreover, this model is based on routing algorithms used by WSNs. In order to evaluate the proposed models, three scenarios were considered to show the impact of the power consumption on the reliability of WSNs. PMID:25157553

  19. A Stream Control Transmission Protocol Based OAM System of 3G Cellular Network

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    OAM (Operations, Administration and Maintenance) system is a very important component of 3G cellular network. In order to acquire overall management, fast response and steady operation, an SCTP (Stream Control Transmission Protocol) based OAM, i. e. , SOAM system was proposed. SOAM implements new characters of SCTP such as multi-stream, enforced SACK and heartbeat mechanism on its transport layer. These characters help SOAM decrease the message transmission delay and accelerate the link failure detection. Besides, a new component named SOAM agent was introduced to improve the operation efficiency of SOAM. The experimental results prove the proposed SOAM system achieves better performance on signaling transmission compared with conventional TCP based OAM system.

  20. Distributed Greedy Scheduling for Multihop Wireless Networks

    OpenAIRE

    Sunny, Albert; Kuri, Joy

    2010-01-01

    We consider the problem of scheduling in multihop wireless networks subject to interference constraints. We consider a graph based representation of wireless networks, where scheduled links adhere to the K-hop link interference model. We develop a distributed greedy heuristic for this scheduling problem. Further, we show that this distributed greedy heuristic computes the exact same schedule as the centralized greedy heuristic.

  1. Performance Analysis of IIUM Wireless Campus Network

    Science.gov (United States)

    Abd Latif, Suhaimi; Masud, Mosharrof H.; Anwar, Farhat

    2013-12-01

    International Islamic University Malaysia (IIUM) is one of the leading universities in the world in terms of quality of education that has been achieved due to providing numerous facilities including wireless services to every enrolled student. The quality of this wireless service is controlled and monitored by Information Technology Division (ITD), an ISO standardized organization under the university. This paper aims to investigate the constraints of wireless campus network of IIUM. It evaluates the performance of the IIUM wireless campus network in terms of delay, throughput and jitter. QualNet 5.2 simulator tool has employed to measure these performances of IIUM wireless campus network. The observation from the simulation result could be one of the influencing factors in improving wireless services for ITD and further improvement.

  2. Performance Analysis of IIUM Wireless Campus Network

    International Nuclear Information System (INIS)

    International Islamic University Malaysia (IIUM) is one of the leading universities in the world in terms of quality of education that has been achieved due to providing numerous facilities including wireless services to every enrolled student. The quality of this wireless service is controlled and monitored by Information Technology Division (ITD), an ISO standardized organization under the university. This paper aims to investigate the constraints of wireless campus network of IIUM. It evaluates the performance of the IIUM wireless campus network in terms of delay, throughput and jitter. QualNet 5.2 simulator tool has employed to measure these performances of IIUM wireless campus network. The observation from the simulation result could be one of the influencing factors in improving wireless services for ITD and further improvement

  3. Performance Analysis of a Novel LBS Application Using MBMS&TPEG in 3G Mobile Networks

    Directory of Open Access Journals (Sweden)

    Lu Lou

    2012-04-01

    Full Text Available Location-based services (LBS provide content that is dynamically customized according to the user's location. These services are commonly delivered to mobile devices. Due to wireless bandwidth limit, broadcasting based transmission technology is one of main methods to provide dynamic real-time information or public emergency for commercial LBS applications. Multimedia Broadcast and Multicast Services (MBMS is a broadcasting service offered via existing GSM and UMTS cellular networks. MBMS has the major benefit that the network infrastructure already exists for mobile network operators and the deployment can be cost effective compared with building a new network for the services. However, Location-based services historically were built as stand-alone applications that did not communicate easily with other applications and systems. Therefore, open standards will be a necessary catalyst for LBS growth. This paper proposes a novel LBS application framework based on the TPEG protocol (transport protocol experts group over MBMS and explains the implement of that using the stream delivery method and download delivery method. For download service, Results of performance tests for FLUTE protocol (File Delivery under unidirectional Transport and FEC (Forward error correction are also presented.

  4. Deployment of Eduroam Federated Wireless Network

    OpenAIRE

    Aduayi-Akue, Joseph

    2010-01-01

    The aim of this project is to deploy the federated wireless network eduroam on the campuses of Vaasa University of Applied Sciences. The project is divided into two parts: the deployment on campuses and the connection to the national network. This thesis focuses on implementation, set up and configuration of different systems composing eduroam. The theoretical part aims to provide enough comprehensive background about the system. The network terms such as wireless network, switch, access p...

  5. Distributed wireless quantum communication networks

    International Nuclear Information System (INIS)

    The distributed wireless quantum communication network (DWQCN) has a distributed network topology and transmits information by quantum states. In this paper, we present the concept of the DWQCN and propose a system scheme to transfer quantum states in the DWQCN. The system scheme for transmitting information between any two nodes in the DWQCN includes a routing protocol and a scheme for transferring quantum states. The routing protocol is on-demand and the routing metric is selected based on the number of entangled particle pairs. After setting up a route, quantum teleportation and entanglement swapping are used for transferring quantum states. Entanglement swapping is achieved along with the process of routing set up and the acknowledgment packet transmission. The measurement results of each entanglement swapping are piggybacked with route reply packets or acknowledgment packets. After entanglement swapping, a direct quantum link between source and destination is set up and quantum states are transferred by quantum teleportation. Adopting this scheme, the measurement results of entanglement swapping do not need to be transmitted specially, which decreases the wireless transmission cost and transmission delay. (general)

  6. How to model wireless mesh networks topology

    International Nuclear Information System (INIS)

    The specification of network connectivity model or topology is the beginning of design and analysis in Computer Network researches. Wireless Mesh Networks is an autonomic network that is dynamically self-organised, self-configured while the mesh nodes establish automatic connectivity with the adjacent nodes in the relay network of wireless backbone routers. Researches in Wireless Mesh Networks range from node deployment to internetworking issues with sensor, Internet and cellular networks. These researches require modelling of relationships and interactions among nodes including technical characteristics of the links while satisfying the architectural requirements of the physical network. However, the existing topology generators model geographic topologies which constitute different architectures, thus may not be suitable in Wireless Mesh Networks scenarios. The existing methods of topology generation are explored, analysed and parameters for their characterisation are identified. Furthermore, an algorithm for the design of Wireless Mesh Networks topology based on square grid model is proposed in this paper. The performance of the topology generated is also evaluated. This research is particularly important in the generation of a close-to-real topology for ensuring relevance of design to the intended network and validity of results obtained in Wireless Mesh Networks researches

  7. Wireless sensor networks in chemical industry

    International Nuclear Information System (INIS)

    Recent advances in wireless technology are a clear indication of the commercial promise of wireless networks. Industrial wireless sensing has now become more economical, efficient and secure as compared to traditional wired sensing. Wireless Sensor Networks (WSN) are successfully being used for process monitoring and control of many industrial plants. This paper explores how Chemical Industry in particular can benefit from the application of WSN technology. Various examples of successful implementation are cited. In order to address the industrial requirements, we propose a low power and low cost solution for process monitoring by implementing WSN. (author)

  8. Contemporary Developments in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sangeeta Mittal

    2012-04-01

    Full Text Available Wireless Sensor Networks (WSN since their inception, a decade ago, have grown well in research and implementation. In this work the developments in WSNs are reported in three sub areas of wireless sensor networks that is, wireless sensor node (hardware and software, Communication & Networking issues in WSNs and application areas. WSNs are characterized by huge data hence research work in aggregation & mining is also discussed. Contemporary issues of integration of WSNs with other prevalent networks, sensor enabled smartness and role of artificial intelligence methods is elaborated. Insight into future directions & research avenues in all the above areas is provided

  9. Proxy SDN Controller for Wireless Networks

    Directory of Open Access Journals (Sweden)

    Won-Suk Kim

    2016-01-01

    Full Text Available Management of wireless networks as well as wired networks by using software-defined networking (SDN has been highlighted continually. However, control features of a wireless network differ from those of a wired network in several aspects. In this study, we identify the various inefficient points when controlling and managing wireless networks by using SDN and propose SDN-based control architecture called Proxcon to resolve these problems. Proxcon introduces the concept of a proxy SDN controller (PSC for the wireless network control, and the PSC entrusted with the role of a main controller performs control operations and provides the latest network state for a network administrator. To address the control inefficiency, Proxcon supports offloaded SDN operations for controlling wireless networks by utilizing the PSC, such as local control by each PSC, hybrid control utilizing the PSC and the main controller, and locally cooperative control utilizing the PSCs. The proposed architecture and the newly supported control operations can enhance scalability and response time when the logically centralized control plane responds to the various wireless network events. Through actual experiments, we verified that the proposed architecture could address the various control issues such as scalability, response time, and control overhead.

  10. A QoS Provisioning Recurrent Neural Network based Call Admission Control for beyond 3G Networks

    Directory of Open Access Journals (Sweden)

    Ramesh Babu H. S.

    2010-03-01

    Full Text Available The Call admission control (CAC is one of the Radio Resource Management (RRM techniques that plays influential role in ensuring the desired Quality of Service (QoS to the users and applications in next generation networks. This paper proposes a fuzzy neural approach for making the call admission control decision in multi class traffic based Next Generation Wireless Networks (NGWN. The proposed Fuzzy Neural call admission control (FNCAC scheme is an integrated CAC module that combines the linguistic control capabilities of the fuzzy logic controller and the learning capabilities of the neural networks. The model is based on recurrent radial basis function networks which have better learning and adaptability that can be used to develop intelligent system to handle the incoming traffic in an heterogeneous network environment. The simulation results are optimistic and indicates that the proposed FNCAC algorithm performs better than the other two methods and the call blocking probability is minimal when compared to other two methods.

  11. A QoS Provisioning Recurrent Neural Network based Call Admission Control for beyond 3G Networks

    CERN Document Server

    S., Ramesh Babu H; S, Satyanarayana P

    2010-01-01

    The Call admission control (CAC) is one of the Radio Resource Management (RRM) techniques that plays influential role in ensuring the desired Quality of Service (QoS) to the users and applications in next generation networks. This paper proposes a fuzzy neural approach for making the call admission control decision in multi class traffic based Next Generation Wireless Networks (NGWN). The proposed Fuzzy Neural call admission control (FNCAC) scheme is an integrated CAC module that combines the linguistic control capabilities of the fuzzy logic controller and the learning capabilities of the neural networks. The model is based on recurrent radial basis function networks which have better learning and adaptability that can be used to develop intelligent system to handle the incoming traffic in an heterogeneous network environment. The simulation results are optimistic and indicates that the proposed FNCAC algorithm performs better than the other two methods and the call blocking probability is minimal when compa...

  12. Resilient networking in wireless sensor networks

    CERN Document Server

    Erdene-Ochir, Ochirkhand; Valois, Fabrice; Kountouris, Apostolos

    2010-01-01

    This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In this report, we focus on the behavior of routing protocols to determine which properties make them more resilient to attacks. Our aim is to find some answers to the following questions. Are there any existing protocols, not designed initially for security, but which already contain some inherently resilient properties against attacks under which some portion of the network nodes is compromised? If yes, which specific behaviors are making these protocols more resilient? We propose in this report an overview of security strategies for WSNs in general, including existing attacks and defensive measures. In this report we focu...

  13. The art of wireless sensor networks

    CERN Document Server

    2014-01-01

    During the last one and a half decades, wireless sensor networks have witnessed significant growth and tremendous development in both academia and industry.   “The Art of Wireless Sensor Networks: Volume 1: Fundamentals” focuses on the fundamentals concepts in the design, analysis, and implementation of wireless sensor networks. It covers the various layers of the lifecycle of this type of network from the physical layer up to the application layer. Its rationale is that the first volume covers contemporary design issues, tools, and protocols for radio-based two-dimensional terrestrial sensor networks. All the book chapters in this volume include up-to-date research work spanning various classic facets of the physical properties and functional behavior of wireless sensor networks, including physical layer, medium access control, data routing, topology management, mobility management, localization, task management, data management, data gathering, security, middleware, sensor technology, standards, and ...

  14. Reliable Multihop Wireless Network Based on Neighbor Node Behavior

    OpenAIRE

    Nobayashi, Daiki

    2011-01-01

    1 Introduction||2 Wireless LAN Technologies and Multihop Wireless Network||3 Access Point Evaluation with Packet Transfer Ratio in Multi-hop Wireless Network||4 Design and Implementation of Reputation Mechanism for Multihop Wireless Network||5 A Network Reconfiguring Scheme against Misbehaving Nodes||6 Concluding Remarks

  15. 低辐射3G 网络基站选址优化∗%Optimized Planning of Low Electromagnetic Radiation 3G Network Base Station Location

    Institute of Scientific and Technical Information of China (English)

    张英杰; 孙先佑; 毛赐平; 王镇道; 许伟; 汤龙波; 艾朝阳

    2015-01-01

    针对民众因担忧电磁辐射而投诉日益增多导致通信基站选址困难的现状,在考虑基站覆盖范围和建站成本的同时,兼顾基站电磁辐射对环境的影响,提出了面向低辐射的3G网络基站选址优化方案。通过对基站选址原则及其典型基站的电磁辐射模型分析,建立了基于多目标的基站评价模型,设计了基于改进的免疫优化算法3G 网络基站选址优化方案,并以模拟实验区域为对象进行了仿真实验测试。实验结果表明:本文提出的选址优化方案不仅能以较小的基站建设代价满足信号覆盖要求,同时也降低了基站电磁辐射的影响,获得了更好的社会效益。%Increasingly more people are worried about the electromagnetic radiation of the communica-tion network base station.The growing number of complaints has made base station siting difficult.This paper considered base station coverage and costs,while taking into account the impact of electromagnetic radiation on the environment of the base station.An optimized low electromagnetic radiation 3G network base stations site selection scheme was proposed in this paper.With the base station siting principles and an analysis of the electromagnetic radiation of typical base stations,this paper established a base station evaluation model based on multi-objective design optimization algorithm and proposed a 3G network base station site selection method based on improved immune optimization.A simulation area was set up for simulation tests.The results show that the proposed base station optimization program can not only meet the coverage requirements with relatively smaller construction cost,but also reduce the impact of electro-magnetic radiation for better social benefits.

  16. Wireless Networks for Body-Centric Communications

    OpenAIRE

    Martelli, Flavia

    2013-01-01

    Progress in miniaturization of electronic components and design of wireless systems paved the way towards ubiquitous and pervasive communications, enabling anywhere and anytime connectivity. Wireless devices present on, inside, around the human body are becoming commonly used, leading to the class of body-centric communications. The presence of the body with all its peculiar characteristics has to be properly taken into account in the development and design of wireless networks in this con...

  17. Wireless communications networks for the smart grid

    CERN Document Server

    Ho, Quang-Dung; Rajalingham, Gowdemy; Le-Ngoc, Tho

    2014-01-01

    This brief presents a comprehensive review of the network architecture and communication technologies of the smart grid communication network (SGCN). It then studies the strengths, weaknesses and applications of two promising wireless mesh routing protocols that could be used to implement the SGCN. Packet transmission reliability, latency and robustness of these two protocols are evaluated and compared by simulations in various practical SGCN scenarios. Finally, technical challenges and open research opportunities of the SGCN are addressed. Wireless Communications Networks for Smart Grid provi

  18. Secure Multipath routing in Wireless Sensor Networks

    OpenAIRE

    Ravindra Gupta; Hema Dhadhal

    2012-01-01

    Wireless sensor networks are usually deployed for gathering data from unattended or hostile environment. Several application specific sensor network data gathering protocols have been proposed in research literatures. However, most of the proposed algorithms have given little attention to the related security issues. In this paper we have explored general security threats in wireless sensor network and made an extensive study to categorize available data gathering protocols and analyze possib...

  19. Lightweight Intrusion Detection in Wireless Sensor Networks

    OpenAIRE

    Riecker, Michael

    2015-01-01

    Wireless sensor networks have become a mature technology. They are increasingly being used in different practical applications. Examples include the monitoring of industrial environments and light adaptation in tunnels. For such applications, attacks are a serious concern. A disrupted sensor network may not only have a financial impact, but could also be safety-critical. Hence, the availability of a wireless sensor network is our key protection goal in this thesis. A special challenge lies in...

  20. Multilayer Statistical Intrusion Detection in Wireless Networks

    OpenAIRE

    Noureddine Boudriga; Amel Meddeb-Makhlouf; Mohamed Hamdi

    2008-01-01

    The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs). This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The archite...

  1. Routing Security in Ad Hoc Wireless Networks

    Science.gov (United States)

    Pervaiz, Mohammad O.; Cardei, Mihaela; Wu, Jie

    Wireless networks provide rapid, untethered access to information and computing, eliminating the barriers of distance, time, and location for many applications ranging from collaborative, distributed mobile computing to disaster recovery (such as fire, flood, earthquake), law enforcement (crowd control, search, and rescue), and military communications (command, control, surveillance, and reconnaissance). An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration [11

  2. Opportunistic Beacon Networks: Information Dissemination via Wireless Network Identifiers

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Hans; Havinga, Paul J.M.

    2016-01-01

    This paper presents OBN, a universal opportunistic ad hoc networking model particularly intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the utilization of universally-available wireless network identifiers. As a ubiquitous

  3. Analyzing multimode wireless sensor networks using the network calculus

    OpenAIRE

    2015-01-01

    The network calculus is a powerful tool to analyze the performance of wireless sensor networks. But the original network calculus can only model the single-mode wireless sensor network. In this paper, we combine the original network calculus with the multimode model to analyze the maximum delay bound of the flow of interest in the multimode wireless sensor network. There are two combined methods A-MM and N-MM. The method A-MM models the whole network as a multimode component, and the method N...

  4. Analysis and Testing of Mobile Wireless Networks

    Science.gov (United States)

    Alena, Richard; Evenson, Darin; Rundquist, Victor; Clancy, Daniel (Technical Monitor)

    2002-01-01

    Wireless networks are being used to connect mobile computing elements in more applications as the technology matures. There are now many products (such as 802.11 and 802.11b) which ran in the ISM frequency band and comply with wireless network standards. They are being used increasingly to link mobile Intranet into Wired networks. Standard methods of analyzing and testing their performance and compatibility are needed to determine the limits of the technology. This paper presents analytical and experimental methods of determining network throughput, range and coverage, and interference sources. Both radio frequency (BE) domain and network domain analysis have been applied to determine wireless network throughput and range in the outdoor environment- Comparison of field test data taken under optimal conditions, with performance predicted from RF analysis, yielded quantitative results applicable to future designs. Layering multiple wireless network- sooners can increase performance. Wireless network components can be set to different radio frequency-hopping sequences or spreading functions, allowing more than one sooner to coexist. Therefore, we ran multiple 802.11-compliant systems concurrently in the same geographical area to determine interference effects and scalability, The results can be used to design of more robust networks which have multiple layers of wireless data communication paths and provide increased throughput overall.

  5. An Enhancement of Authentication Protocol and Key Agreement (AKA For 3G Mobile Networks

    Directory of Open Access Journals (Sweden)

    Mustafa AL-Fayoumi

    2011-05-01

    Full Text Available This paper proposes a secure authentication mechanism by integrating the public key with thehash-chaining technique. The propose protocol satisfies the security requirements of thirdgeneration (3G mobile networks. Also provide the protection of the international mobilesubscriber identity (IMSI to ensure subscriber un-traceability, key refreshment periodically,strong key management and a new non-repudiation service in a simple and elegant way. Theproposed protocol is more secure protocol than the other available authentication protocols. Toavoid the complicated synchronization as in universal mobile telecommunications system (UMTSthe proposed protocol does not use sequence number (SEQ, the management of a hash chain issimple and elegant compared to that of SEQ. This proposed protocol is secure against networkattacks, such as replay attacks, guessing attacks, and other attacks.

  6. Wireless Sensor Networks: Opportunities and Challenges

    Directory of Open Access Journals (Sweden)

    Matthew N. O. Sadiku

    2014-01-01

    Full Text Available The popularity of cell phones, laptops, PDAs and intelligent electronics has made computing devices to become cheaper and more pervasive in daily life. The desire for connectivity among these devices has caused an exponential growth in wireless communication. Wireless sensor networks (WSNs provide an example of this phenomenon. WSNs belong to the general family of sensor networks that employ distributed sensors to collect information on entities of interest. This paper provides a brief introduction to wireless sensor networks. It addresses the opportunities and challenges of WSNs

  7. Coalitions in Cooperative Wireless Networks

    CERN Document Server

    Mathur, Suhas; Mandayam, Narayan B

    2008-01-01

    Cooperation between rational users in wireless networks is studied using coalitional game theory. Using the rate achieved by a user as its utility, it is shown that the stable coalition structure, i.e., set of coalitions from which users have no incentives to defect, depends on the manner in which the rate gains are apportioned among the cooperating users. Specifically, the stability of the grand coalition (GC), i.e., the coalition of all users, is studied. Transmitter and receiver cooperation in an interference channel (IC) are studied as illustrative cooperative models to determine the stable coalitions for both flexible (transferable) and fixed (non-transferable) apportioning schemes. It is shown that the stable sum-rate optimal coalition when only receivers cooperate by jointly decoding (transferable) is the GC. The stability of the GC depends on the detector when receivers cooperate using linear multiuser detectors (non-transferable). Transmitter cooperation is studied assuming that all receivers coopera...

  8. Transmission capacity of wireless networks

    CERN Document Server

    Weber, Steven

    2012-01-01

    Transmission capacity (TC) is a performance metric for wireless networks that measures the spatial intensity of successful transmissions per unit area, subject to a constraint on the permissible outage probability (where outage occurs when the SINR at a receiver is below a threshold). This volume gives a unified treatment of the TC framework that has been developed by the authors and their collaborators over the past decade. The mathematical framework underlying the analysis (reviewed in Ch. 2) is stochastic geometry: Poisson point processes model the locations of interferers, and (stable) shot noise processes represent the aggregate interference seen at a receiver. Ch. 3 presents TC results (exact, asymptotic, and bounds) on a simple model in order to illustrate a key strength of the framework: analytical tractability yields explicit performance dependence upon key model parameters. Ch. 4 presents enhancements to this basic model --- channel fading, variable link distances, and multi-hop. Ch. 5 presents four...

  9. Multi-Radio Cooperative ARQ in wireless cellular networks: a MAC layer perspective

    OpenAIRE

    Alonso Zárate, Jesús; Kartsakli, Elli; Katz, Marcos; Alonso Zárate, Luis Gonzaga; Verikoukis, Christos

    2013-01-01

    Multi-Radio Cooperative Automatic Retransmission Request (MCARQ) schemes are introduced in this paper within the context of hybrid networks which combine long-range and short-range communications. Since the number of wireless devices is incessantly increasing, it is frequently possible to establish a spontaneous cooperative cluster in the close proximity of any wireless device. These devices forming the cluster are connected to both a cellular-based network such as WiMAX, 3G...

  10. Securing radars using secure wireless sensor networking

    Science.gov (United States)

    Tahmoush, David

    2014-06-01

    Radar sensors can be viewed as a limited wireless sensor network consisting of radar transmitter nodes, target nodes, and radar receiver nodes. The radar transmitter node sends a communication signal to the target node which then reflects it in a known pattern to the radar receiver nodes. This type of wireless sensor network is susceptible to the same types of attacks as a traditional wireless sensor network, but there is less opportunity for defense. The target nodes in the network are unable to validate the return signal, and they are often uncooperative. This leads to ample opportunities for spoofing and man-in-the-middle attacks. This paper explores some of the fundamental techniques that can be used against a limited wireless network system as well as explores the techniques that can be used to counter them.

  11. On computer vision in wireless sensor networks.

    Energy Technology Data Exchange (ETDEWEB)

    Berry, Nina M.; Ko, Teresa H.

    2004-09-01

    Wireless sensor networks allow detailed sensing of otherwise unknown and inaccessible environments. While it would be beneficial to include cameras in a wireless sensor network because images are so rich in information, the power cost of transmitting an image across the wireless network can dramatically shorten the lifespan of the sensor nodes. This paper describe a new paradigm for the incorporation of imaging into wireless networks. Rather than focusing on transmitting images across the network, we show how an image can be processed locally for key features using simple detectors. Contrasted with traditional event detection systems that trigger an image capture, this enables a new class of sensors which uses a low power imaging sensor to detect a variety of visual cues. Sharing these features among relevant nodes cues specific actions to better provide information about the environment. We report on various existing techniques developed for traditional computer vision research which can aid in this work.

  12. Wireless Laptops and Local Area Networks.

    Science.gov (United States)

    Tolson, Stephanie Diane

    2001-01-01

    Describes experiences at St. Louis Community College at Florissant Valley (Missouri) with the use of wireless technology and a local area network for library bibliographic instruction. Discusses faculty input and attitudes; technical challenges; and experiences at other community colleges that have found wireless connections more economical than…

  13. Mobility and Handoff Management in Wireless Networks

    CERN Document Server

    Sen, Jaydip

    2010-01-01

    With the increasing demands for new data and real-time services, wireless networks should support calls with different traffic characteristics and different Quality of Service (QoS)guarantees. In addition, various wireless technologies and networks exist currently that can satisfy different needs and requirements of mobile users. Since these different wireless networks act as complementary to each other in terms of their capabilities and suitability for different applications, integration of these networks will enable the mobile users to be always connected to the best available access network depending on their requirements. This integration of heterogeneous networks will, however, lead to heterogeneities in access technologies and network protocols. To meet the requirements of mobile users under this heterogeneous environment, a common infrastructure to interconnect multiple access networks will be needed. In this chapter, the design issues of a number of mobility management schemes have been presented. Eac...

  14. Routing for wireless multi-hop networks

    CERN Document Server

    Hamid, Sherin Abdel; Takahara, Glen

    2013-01-01

    The focus of this brief is to identify what unifies and what distinguishes the routing functions in four wireless multi-hop network paradigms. The brief introduces a generic routing model that can be used as a foundation of wireless multi-hop routing protocol analysis and design. It demonstrates that such model can be adopted by any wireless multi-hop routing protocol. Also presented is a glimpse of the ideal wireless multi-hop routing protocol along with several open issues.

  15. A wireless robot for networked laparoscopy.

    Science.gov (United States)

    Castro, Cristian A; Alqassis, Adham; Smith, Sara; Ketterl, Thomas; Sun, Yu; Ross, Sharona; Rosemurgy, Alexander; Savage, Peter P; Gitlin, Richard D

    2013-04-01

    State-of-the-art laparoscopes for minimally invasive abdominal surgery are encumbered by cabling for power, video, and light sources. Although these laparoscopes provide good image quality, they interfere with surgical instruments, occupy a trocar port, require an assistant in the operating room to control the scope, have a very limited field of view, and are expensive. MARVEL is a wireless Miniature Anchored Robotic Videoscope for Expedited Laparoscopy that addresses these limitations by providing an inexpensive in vivo wireless camera module (CM) that eliminates the surgical-tool bottleneck experienced by surgeons in current laparoscopic endoscopic single-site (LESS) procedures. The MARVEL system includes 1) multiple CMs that feature a wirelessly controlled pan/tilt camera platform, which enable a full hemisphere field of view inside the abdominal cavity, wirelessly adjustable focus, and a multiwavelength illumination control system; 2) a master control module that provides a near-zero latency video wireless communications link, independent wireless control for multiple MARVEL CMs, digital zoom; and 3) a wireless human-machine interface that gives the surgeon full control over CM functionality. The research reported in this paper is the first step in developing a suite of semiautonomous wirelessly controlled and networked robotic cyber-physical devices to enable a paradigm shift in minimally invasive surgery and other domains such as wireless body area networks.

  16. A wireless robot for networked laparoscopy.

    Science.gov (United States)

    Castro, Cristian A; Alqassis, Adham; Smith, Sara; Ketterl, Thomas; Sun, Yu; Ross, Sharona; Rosemurgy, Alexander; Savage, Peter P; Gitlin, Richard D

    2013-04-01

    State-of-the-art laparoscopes for minimally invasive abdominal surgery are encumbered by cabling for power, video, and light sources. Although these laparoscopes provide good image quality, they interfere with surgical instruments, occupy a trocar port, require an assistant in the operating room to control the scope, have a very limited field of view, and are expensive. MARVEL is a wireless Miniature Anchored Robotic Videoscope for Expedited Laparoscopy that addresses these limitations by providing an inexpensive in vivo wireless camera module (CM) that eliminates the surgical-tool bottleneck experienced by surgeons in current laparoscopic endoscopic single-site (LESS) procedures. The MARVEL system includes 1) multiple CMs that feature a wirelessly controlled pan/tilt camera platform, which enable a full hemisphere field of view inside the abdominal cavity, wirelessly adjustable focus, and a multiwavelength illumination control system; 2) a master control module that provides a near-zero latency video wireless communications link, independent wireless control for multiple MARVEL CMs, digital zoom; and 3) a wireless human-machine interface that gives the surgeon full control over CM functionality. The research reported in this paper is the first step in developing a suite of semiautonomous wirelessly controlled and networked robotic cyber-physical devices to enable a paradigm shift in minimally invasive surgery and other domains such as wireless body area networks. PMID:23232365

  17. Availability issues in wireless visual sensor networks.

    Science.gov (United States)

    Costa, Daniel G; Silva, Ivanovitch; Guedes, Luiz Affonso; Vasques, Francisco; Portugal, Paulo

    2014-01-01

    Wireless visual sensor networks have been considered for a large set of monitoring applications related with surveillance, tracking and multipurpose visual monitoring. When sensors are deployed over a monitored field, permanent faults may happen during the network lifetime, reducing the monitoring quality or rendering parts or the entire network unavailable. In a different way from scalar sensor networks, camera-enabled sensors collect information following a directional sensing model, which changes the notions of vicinity and redundancy. Moreover, visual source nodes may have different relevancies for the applications, according to the monitoring requirements and cameras' poses. In this paper we discuss the most relevant availability issues related to wireless visual sensor networks, addressing availability evaluation and enhancement. Such discussions are valuable when designing, deploying and managing wireless visual sensor networks, bringing significant contributions to these networks. PMID:24526301

  18. Topology Optimisation of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Thike Aye Min

    2016-01-01

    Full Text Available Wireless sensor networks are widely used in a variety of fields including industrial environments. In case of a clustered network the location of cluster head affects the reliability of the network operation. Finding of the optimum location of the cluster head, therefore, is critical for the design of a network. This paper discusses the optimisation approach, based on the brute force algorithm, in the context of topology optimisation of a cluster structure centralised wireless sensor network. Two examples are given to verify the approach that demonstrate the implementation of the brute force algorithm to find an optimum location of the cluster head.

  19. Comparison of 3G and 4G networks%3G和4G网络的对比

    Institute of Scientific and Technical Information of China (English)

    张云龙

    2013-01-01

      3G, the full name of 3 rd Generation, the Chinese called the third Generation of digital communications. In order to provide the services, the wireless network must be able to support different data transmission speed, that is to say, in indoor, outdoor, and driving environment can support at least 2 MBPS respectively (megabytes per second), 384 KBPS (kilobytes per second) and the transmission speed of 144 KBPS. 4G, which is short for fourth generation mobile communication technology, is a collection of 3G and WLAN in one and be able to transmit high-quality video images, and almost the same quality of image transmission and high-definition television technology products. 4G system can download at a speed of 100 MBPS, 2000 times faster than dial-up Internet access, upload speed can reach 20 megabits per second, and be able to meet the requirements of almost all users of wireless services. Infrastructure based on 3G and 4G, multi-address access technology, performance, safety regulations, provide services, facing problems and the existing problems in performance, the existing problems in safety, etc, to carry out comparison and contrast.%  3G,全称3rd Generation,中文称第三代数字通信。为了提供这种服务,无线网络必须能够支持不同的数据传输速度,也就是说在室内、室外和行车的环境中能够分别至少支持2Mbps(兆字节/每秒)、384kbps(千字节/每秒)以及144kbps的传输速度。4G,简称第四代移动通信及其技术,下载速度达100Mbps,比拨号上网快2000倍,上传速度达20Mbps,可以满足几乎所有用户对无线服务的要求。集3G与WLAN于一体并能够传输高质量视频图像以及图像传输质量与高清度电视不相上下的技术产品。本文从3G和4G的基础设施、多地址接入技术、性能、安全规定、提供服务、面临问题、性能上存在的问题、安全上存在的问题等方面来进行对比和比较。

  20. Transmit Power Optimisation in Wireless Network

    OpenAIRE

    Besnik Terziu

    2011-01-01

    Transmit power optimisation in wireless networks based on beamforming have emerged as a promising technique to enhance the spectrum efficiency of present and future wireless communication systems. The aim of this study is to minimise the access point power consumption in cellular networks while maintaining a targeted quality of service (QoS) for the mobile terminals. In this study, the targeted quality of service is delivered to a mobile station by providing a desired level of Signal to Inter...

  1. ECDH power consumption in wireless sensor networks

    OpenAIRE

    Kukuseva, Maja; Citkuseva Dimitrovska, Biljana

    2013-01-01

    Elliptic Curve Cryptography is cryptographic scheme that combines low power usage for key generation and high level of security in constrained Wireless Sensor Networks. Each sensor node is powered by a battery that should last for long period. This constrains wireless sensor networks in terms of energy usage. Another critical issue is secure communications ant thus, the development of cryptographic scheme is difficult and challenging task. Elliptic Curve Diffie- Hellman is secu...

  2. Intrusion detection and monitoring for wireless networks.

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.; Stephano, Amanda (Indiana University); Tabriz, Parisa (University of Illinois at Urbana-Champaign); Pelon, Kristen (Cedarville University); McCoy, Damon (University of Colorado, Boulder); Lodato, Mark (Lafayette College); Hemingway, Franklin (University of New Mexico); Custer, Ryan P.; Averin, Dimitry (Polytechnic University); Franklin, Jason (Carnegie Mellon University); Kilman, Dominique Marie

    2005-11-01

    Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more

  3. A Survey on Energy Efficiency for Wireless Mesh Network

    OpenAIRE

    Sarra Mamechaoui; Fedoua Didi; Guy Pujolle

    2013-01-01

    Reducing CO2 emissions is an important global environmental issue. Over the recent years, wireless and mobile communications have increasingly become popular with consumers. An increasingly popular type of wireless access is the so-called Wireless Mesh Networks (WMNs) that provide wireless connectivity through much cheaper and more flexible backhaul infrastructure compared with wired solutions. Wireless Mesh Network (WMN) is an emerging new technology which is being adopted as the wireless in...

  4. Genetic Algorithm for Hierarchical Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sajid Hussain

    2007-09-01

    Full Text Available Large scale wireless sensor networks (WSNs can be used for various pervasive and ubiquitous applications such as security, health-care, industry automation, agriculture, environment and habitat monitoring. As hierarchical clusters can reduce the energy consumption requirements for WSNs, we investigate intelligent techniques for cluster formation and management. A genetic algorithm (GA is used to create energy efficient clusters for data dissemination in wireless sensor networks. The simulation results show that the proposed intelligent hierarchical clustering technique can extend the network lifetime for different network deployment environments.

  5. 4G Wireless Networks: Opportunities and Challenges

    CERN Document Server

    Gobjuka, Hassan

    2009-01-01

    With the major wireless service providers planning to start deployment of 4G wireless networks by mid 2010, research and industry communities are racing against time to find solutions for some of the prominent still open issues in 4G networks. The growing interest in 4G networks is driven by the set of new services will be made available for the first time such as accessing the Internet anytime from anywhere, global roaming, and wider support for multimedia applications. In this paper describe some of the key opportunities will be made available by 4G networks, present key challenges and point to some proposed solutions.

  6. Forest Fire Prevention using Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    PRASHANTH

    2012-01-01

    Full Text Available Because of the rapid development of sensors, microprocessors, and network technology, a reliable technological condition has been provided for our automatic real-time monitoring of forest fires control. This paper presents a new type of early warning systems which use a wireless sensor network to collect the information of forest fire-prone sections for forest fire, wireless sensor nodes constitute a "smart" monitoring and control network through the self-organization and transmits the messages to the control center through the network, thus we can achieve the remote control of the forest fire.

  7. 3patial Load Balancing in Nide-Area Wireless Networks

    Institute of Scientific and Technical Information of China (English)

    Kambiz Azarian; Ravindra Patwardhan; Chris Lott; Donna Ghosh; Radhika Gowaikar; Rashid Attar

    2011-01-01

    Load balancing is typically used in the frequency domain of cellular wireless networks to balance paging, access, and traffic load across the available bandwidth. In this paper, we extend load balancing into the spatial domain, and we develop two approaches--network load balancing and single-carrier multilink--for spatial load balancing. Although these techniques are mostly applied to cellular wireless networks and Wi-Fi networks, we show how they can be applied to EV-DO, a 3G cellular data network. When a device has more than one candidate server, these techniques can be used to determine the quality of the channel between a server and the device and to determine the Ipad on each server. The proposed techniques leverage the advantages of existing EV-DO network architecture and are fully backward compatible. Network operators can substantially increase network capacity and improve user experience by using these techniques. Combining load balancing in the frequency and spatial domains improves connectivity within a network and allows resources to be optimally allocated according to the p-fair criterion. Combined load balancing further improves performance.

  8. Topological properties of random wireless networks

    Indian Academy of Sciences (India)

    Srikanth K Iyer; D Manjunath

    2006-04-01

    Wireless networks in which the node locations are random are best modelled as random geometric graphs (RGGs). In addition to their extensive application in the modelling of wireless networks, RGGs find many new applications and are being studied in their own right. In this paper we first provide a brief introduction to the issues of interest in random wireless networks. We then discuss some recent results for one-dimensional networks with the nodes distributed uniformly in $(0, z)$.We then discuss some asymptotic results for networks in higher dimensions when the nodes are distributed in a finite volume. Finally we discuss some recent generalisations in considering non uniform transmission ranges and non uniform node distributions. An annotated bibliography of some of the recent literature is also provided.

  9. Analysis of blocking rate and bandwidth usage of mobile IPTV services in wireless cellular networks.

    Science.gov (United States)

    Li, Mingfu

    2014-01-01

    Mobile IPTV services over wireless cellular networks become more and more popular, owing to the significant growth in access bandwidth of wireless cellular networks such as 3G/4G and WiMAX. However, the spectrum resources of wireless cellular networks is rare. How to enhance the spectral efficiency of mobile networks becomes an important issue. Unicast, broadcast, and multicast are the most important transport schemes for offering mobile IPTV services over wireless cellular networks. Therefore, bandwidth usages and blocking rates of unicast, broadcast, and multicast IPTV services were analyzed and compared in this paper. Simulations were also conducted to validate the analytical results. Numerical results demonstrate that the presented analysis is correct, and multicast scheme achieves the best bandwidth usage and blocking rate performance, relative to the other two schemes. PMID:25379521

  10. Analysis of blocking rate and bandwidth usage of mobile IPTV services in wireless cellular networks.

    Science.gov (United States)

    Li, Mingfu

    2014-01-01

    Mobile IPTV services over wireless cellular networks become more and more popular, owing to the significant growth in access bandwidth of wireless cellular networks such as 3G/4G and WiMAX. However, the spectrum resources of wireless cellular networks is rare. How to enhance the spectral efficiency of mobile networks becomes an important issue. Unicast, broadcast, and multicast are the most important transport schemes for offering mobile IPTV services over wireless cellular networks. Therefore, bandwidth usages and blocking rates of unicast, broadcast, and multicast IPTV services were analyzed and compared in this paper. Simulations were also conducted to validate the analytical results. Numerical results demonstrate that the presented analysis is correct, and multicast scheme achieves the best bandwidth usage and blocking rate performance, relative to the other two schemes.

  11. Performance Analysis of Wireless Networks With MDQOS

    Directory of Open Access Journals (Sweden)

    A. Leelavathi

    2014-07-01

    Full Text Available In Wireless/Mobile networks various kinds of encoding schemes were used for transmission of data over a bandwidth. The desired quality and generated traffic varies with the requirement with this bandwidth. A generic video telephony may require more than 40 kbps whereas a low motion video telephony may require about 25 kbps for data transmission. From the designing point of view these requirements demands for an alternative resource planning, especially for bandwidth allocation in wireless networks. In wireless network where bandwidth is a scare resource, the system may need to block incoming user if all of the bandwidth has been used to provide highest quality of service to existing users. However this bandwidth resource planning may be unacceptable for larger application. A degradable approach to multiple users can be made on bandwidth allocation to reduce the blocking probability without degrading the quality of service to existing users. This work aims towards a realization of a wireless/mobile network using W-CDMA multi access technique supporting multilevel quality of services. The bandwidth allocation to multiple users is adjusted dynamically according to the required network condition so as to increase bandwidth utilization. The work analyze the performance deriving the degradation period ratio, mean degradation time and degradation state for the implemented wireless network.The proposed work is aim to implement on Matlab tool for its functional verification considering various mobility patterns

  12. Sensor Fusion-based Event Detection in Wireless Sensor Networks

    NARCIS (Netherlands)

    Bahrepour, M.; Meratnia, N.; Havinga, P.J.M.

    2009-01-01

    Recently, Wireless Sensor Networks (WSN) community has witnessed an application focus shift. Although, monitoring was the initial application of wireless sensor networks, in-network data processing and (near) real-time actuation capability have made wireless sensor networks suitable candidate for ev

  13. Case Study of Wireless Networking for Small Business

    OpenAIRE

    Rehan Jamil, Irfan Jamil, Muhammad Ismail, Naveed Ur Rehman

    2015-01-01

    Mobile and wireless networks have undergone rapid changes and have seen an unprecedented growth during the last few years. Traditional ways of networking have changed to accommodate new lifestyles and newer ways of working. Wireless networks offer several advantages over fixed or wired networks through mobility, flexibility, ease of access, speed of deployment, and low cost. Flexibility of wireless networks facilitates rapid deployment. Finally, this paper identifies the benefits of wireless ...

  14. Routing in Wireless Networks with Position Trees

    OpenAIRE

    Chavez, Edgar; Mitton, Nathalie; Tejeda, Hector

    2007-01-01

    Sensor networks are wireless adhoc networks where all the nodes cooperate for routing messages in the absence of a fixed infrastructure. Non-flooding, guaranteed delivery routing protocols are preferred because sensor networks have limited battery life. Location aware routing protocols are good candidates for sensor network applications, nevertheless they need either an external location service like GPS or Galileo (which are bulky, energy consuming devices) or internal location services prov...

  15. Multilayer Statistical Intrusion Detection in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Noureddine Boudriga

    2008-12-01

    Full Text Available The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs. This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The architecture is adequate to wireless networks because the underlying detection models rely on radio parameters and traffic models. Accurate correlation between radio and traffic anomalies allows enhancing the efficiency of the IDS. A radio signal fingerprinting technique based on the maximal overlap discrete wavelet transform (MODWT is developed. Moreover, a geometric clustering algorithm is presented. Depending on the characteristics of the fingerprinting technique, the clustering algorithm permits to control the false positive and false negative rates. Finally, simulation experiments have been carried out to validate the proposed IDS.

  16. Secure Routing in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Soumyashree Sahoo

    2012-01-01

    Full Text Available Wireless sensor networks is the new concept in the field of networks consists of small, large number of sensing nodes which is having the sensing, computational and transmission power. Due to lack of tamper-resistant infrastructure and the insecure nature of wireless communication channels, these networks are vulnerable to internal and external attacks. Key Management is a major challenge to achieve security in wireless sensor networks. Key management includes the process of key setup, the initial distribution of keys and keys revocation. To provide security and proper routing or communication should be encrypted and authenticated. It is not easy to achieve secure key establishment without public key cryptography. In this thesis, some key management schemes have been purposed which will be valuable for secure routing between different sensor nodes.

  17. Wireless Sensor Networks for Ambient Assisted Living

    Directory of Open Access Journals (Sweden)

    Raúl Aquino-Santos

    2013-11-01

    Full Text Available This paper introduces wireless sensor networks for Ambient Assisted Living as a proof of concept. Our workgroup has developed an arrhythmia detection algorithm that we evaluate in a closed space using a wireless sensor network to relay the information collected to where the information can be registered, monitored and analyzed to support medical decisions by healthcare providers. The prototype we developed is then evaluated using the TelosB platform. The proposed architecture considers very specific restrictions regarding the use of wireless sensor networks in clinical situations. The seamless integration of the system architecture enables both mobile node and network configuration, thus providing the versatile and robust characteristics necessary for real-time applications in medical situations. Likewise, this system architecture efficiently permits the different components of our proposed platform to interact efficiently within the parameters of this study.

  18. Agent routing algorithm in wireless sensor networks

    Science.gov (United States)

    Zhang, Yuqing; Yang, Shuqun

    2013-03-01

    Wireless sensor networks are a new technology of information acquisition and processing, so they are widely used in all kinds of fields. In the paper we introduce Agent technology into the wireless sensor network, conduct a in-depth research on the four routing schemes, and propose a new improved routing scheme, which considers the energy consumption of both nodes and path. Furthermore, The scheme we proposed has efficient routing function, can balance the energy consumption of nodes and extends the lifetime of the network in a more efficient way.

  19. Wireless vehicular networks for car collision avoidance

    CERN Document Server

    2013-01-01

    Wireless Vehicular Networks for Car Collision Avoidance focuses on the development of the ITS (Intelligent Transportation Systems) in order to minimize vehicular accidents. The book presents and analyses a range of concrete accident scenarios while examining the causes of vehicular collision and proposing countermeasures based on wireless vehicular networks. The book also describes the vehicular network standards and quality of service mechanisms focusing on improving critical dissemination of safety information. With recommendations on techniques and protocols to consider when improving road safety policies in order to minimize crashes and collision risks.

  20. WIRELESS NETWORKS: DEVELOPMENTS, THREATS AND COUNTERMEASURES

    OpenAIRE

    Mardiana Mohamad Noor; Wan Haslina Hassan

    2013-01-01

    This paper discusses current threats in wireless networks and some academia research reviews regarding the matters. Significant and persistent threats discussed are sniffing, Man In the Middle Attack (MITM), Rogue Access Points (RAP), Denial Of Services (DoS) and social engineering attacks. Some current developments of wireless communication technology such as short range communication, cloud computing, bring your own device policy (BYOD), devices tethering and convergences of WiFi and cellul...

  1. Intelligent Communication Module for Wireless Biosensor Networks

    OpenAIRE

    Naik, R.; Singh, J.; Le, H. P.

    2010-01-01

    This chapter presented a new paradigm of biosensors which have processing capability with an intelligent and adaptive wireless communication module. The adaptive communication module efficiently reconfigures its hardware components according to the changes in operating environment in order to reduce system power consumption and optimally utilise resources. The chapter presented several significant applications of wireless biosensor networks which hold enormous potential to benefit the communi...

  2. TCP Performance in Heterogeneous Wireless Networks

    OpenAIRE

    Sarolahti, Pasi

    2007-01-01

    The TCP protocol is used by most Internet applications today, including the recent mobile wireless terminals that use TCP for their World-Wide Web, E-mail and other traffic. The recent wireless network technologies, such as GPRS, are known to cause delay spikes in packet transfer. This causes unnecessary TCP retransmission timeouts. This dissertation proposes a mechanism, Forward RTO-Recovery (F-RTO) for detecting the unnecessary TCP retransmission timeouts and thus allow TCP to take appropri...

  3. Modeling Multistandard Wireless Networks in OPNET

    DEFF Research Database (Denmark)

    Zakrzewska, Anna; Berger, Michael Stübert; Ruepp, Sarah Renée

    2011-01-01

    Future wireless communication is emerging towards one heterogeneous platform. In this new environment wireless access will be provided by multiple radio technologies that are cooperating and complementing one another. The paper investigates the possibilities of developing such a multistandard sys...... system using OPNET Modeler. A network model consisting of LTE interworking with WLAN and WiMAX is considered from the radio resource management perspective. In particular, implementing a joint packet scheduler across multiple systems is discussed more in detail....

  4. A Control and Management Network for Wireless ATM Systems

    OpenAIRE

    Bush, Stephen F.; Jagannath, Sunil; Evans, Joseph B.; Frost, Victor; Minden, Gary; Shanmugan, K. Sam

    1999-01-01

    This paper describes the design of a control and management network (orderwire) for a mobile wireless Asynchronous Transfer Mode (ATM) network. This mobile wireless ATM network is part of the Rapidly Deployable Radio Network (RDRN). The orderwire system consists of a packet radio network which overlays the mobile wireless ATM network, each network element in this network uses Global Positioning System (GPS) information to control a beamforming antenna subsystem which provides for spatial reus...

  5. Service discovery in heterogeneous wireless networks

    NARCIS (Netherlands)

    Blangé, M.J.; Karkowski, I.P.; Vermeulen, B.C.B.

    2005-01-01

    In this paper we describe a possible solution to the problem of service discovery in heterogeneous wireless networks. This solution involves introduction of a network independent service discovery layer, with as main goal the improved robustness of applications running on top of it. A possible imple

  6. Wireless Sensor Network Software Design Rules

    OpenAIRE

    Strazdiņš, Ģirts

    2014-01-01

    Abstract In the last decade wireless sensor networks (WSNs) have evolved as a promising approach for smart investigation of our planet, providing solutions for environment and wild animal monitoring, security system development, human health telemonitoring and control, industrial manufacturing and other domains. Lack of unified standards and methodologies leads to limited sensor network solution interoperability and portability. Significant number of WSN operating systems...

  7. Energy-Harvesting Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Vuckovic, Dusan; Di Mauro, Alessio;

    2012-01-01

    Energy Harvesting comprises a promising solution to one of the key problems faced by battery-powered Wireless Sensor Networks, namely the limited nature of the energy supply (finite battery capacity). By harvesting energy from the surrounding environment, the sensors can have a continuous lifetime...... Sensor Networks with energy harvesting capability....

  8. Wireless Sensor Networks : Structure and Algorithms

    NARCIS (Netherlands)

    van Dijk, T.C.

    2014-01-01

    In this thesis we look at various problems in wireless networking. First we consider two problems in physical-model networks. We introduce a new model for localisation. The model is based on a range-free model of radio transmissions. The first scheme is randomised and we analyse its expected perform

  9. Flexible network wireless transceiver and flexible network telemetry transceiver

    Science.gov (United States)

    Brown, Kenneth D.

    2008-08-05

    A transceiver for facilitating two-way wireless communication between a baseband application and other nodes in a wireless network, wherein the transceiver provides baseband communication networking and necessary configuration and control functions along with transmitter, receiver, and antenna functions to enable the wireless communication. More specifically, the transceiver provides a long-range wireless duplex communication node or channel between the baseband application, which is associated with a mobile or fixed space, air, water, or ground vehicle or other platform, and other nodes in the wireless network or grid. The transceiver broadly comprises a communication processor; a flexible telemetry transceiver including a receiver and a transmitter; a power conversion and regulation mechanism; a diplexer; and a phased array antenna system, wherein these various components and certain subcomponents thereof may be separately enclosed and distributable relative to the other components and subcomponents.

  10. Mobile Health Care over 3G Networks: the MobiHealth Pilot System and Service

    NARCIS (Netherlands)

    Wac, Katarzyna; Bults, Richard; Konstantas, Dimitri; Halteren, van Aart; Jones, Val; Widya, Ing; Herzog, Rainer

    2004-01-01

    Health care is one of the most prominent areas for the application of wireless technologies. New services and applications are today under research and development targeting different areas of health care, from high risk and chronic patients’ remote monitoring to mobility tools for the medical perso

  11. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  12. Cooperative Jamming for Physical Layer Security in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee

    2012-01-01

    Interference is generally considered as the redundant and unwanted occurrence in wireless communication. This work proposes a novel cooperative jamming mechanism for scalable networks like Wireless Sensor Networks (WSNs) which makes use of friendly interference to confuse the eavesdropper...

  13. Data Dissemination in Wireless Networks with Network Coding

    CERN Document Server

    Firooz, Mohammad H

    2012-01-01

    We investigate the use of network coding for information dissemination over a wireless network. Using network coding allows for a simple, distributed and robust algorithm where nodes do not need any information from their neighbors. In this paper, we analyze the time needed to diffuse information throughout a network when network coding is implemented at all nodes. We then provide an upper bound for the dissemination time for ad-hoc networks with general topology. Moreover, we derive a relation between dissemination time and the size of the wireless network. It is shown that for a wireless network with N nodes, the dissemination latency is between O(N) and O(N^2), depending on the reception probabilities of the nodes. These observations are validated by the simulation results.

  14. Research on 3G wireless video monitoring terminal system%“两客一危”3G无线视频监控车载系统

    Institute of Scientific and Technical Information of China (English)

    姜敏

    2013-01-01

      全面提升“两客一危”车辆的行驶安全和客运服务质量,利用加载了3G模块的无线视频监控车载终端系统,实现对车辆行驶记录、视频取证、远程视频监控的管理。车内安装摄像机、拾音器、紧急报警按钮和车载信息显示屏,分别作为视频图像、音频数据、紧急报警信息、GPS等信息的采集设备,采集后的信息经过车载硬盘录像机的处理之后,由车载硬盘录像机自带的3G无线通信模块发送给监控中心。%To improve the safety and service performance quality of long-distance and dangerous goods vehicle, the wireless video monitoring terminal system with 3G modules is designed to realize effective vehicle position, driving recording and remote video monitoring. On-board camera, pickups, emergency button and vehicle display are used for data acquisition which is transferred to monitor center with 3G wireless module.

  15. Efficient Wireless Charger Deployment for Wireless Rechargeable Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jehn-Ruey Jiang

    2016-08-01

    Full Text Available A wireless rechargeable sensor network (WRSN consists of sensor nodes that can harvest energy emitted from wireless chargers for refilling their batteries so that the WRSN can operate sustainably. This paper assumes wireless chargers are equipped with directional antennas, and are deployed on grid points of a fixed height to propose two heuristic algorithms solving the following wireless charger deployment optimization (WCDO problem: how to deploy as few as possible chargers to make the WRSN sustainable. Both algorithms model the charging space of chargers as a cone and calculate charging efficiency according power regression expressions complying with the Friis transmission equation. The two algorithms are the greedy cone covering (GCC algorithm and the adaptive cone covering (ACC algorithm. The GCC (respectively, ACC algorithm greedily (respectively, adaptively generates candidate cones to cover as many as possible sensor nodes. Both algorithms then greedily select the fewest number of candidate cones, each of which corresponds to the deployment of a charger, to have approximate solutions to the WCDO problem. We perform experiments, conduct simulations and do analyses for the algorithms to compare them in terms of the time complexity, the number of chargers deployed, and the execution time.

  16. Application of 3G Mobile Wireless Video Monitoring Technology in Coal Mine%3G移动无线视频监控技术在煤矿的应用

    Institute of Scientific and Technical Information of China (English)

    朱豫虹; 姚善化

    2012-01-01

    This paper describes the video coding standard H.264 and 3G network connection technology.For the complex work environment of coal mine,the method of using 3G network technology to achieve wireless video monitoring is proposed,the H.264 coding standard and channel transmission RTP / RTCP protocols which are applicable in 3G environment are selected,and the purpose of mobile remote video surveillance of the production status in mine is achieved.%介绍了视频编码H.264标准和3G网络连接技术,针对矿井复杂的工作环境,提出了利用3G网络技术实现无线视频监控的方法,选择适用于3G环境背景的H.264编码标准以及信道传输RTP/RTCP协议,实现了移动远程视频监控矿井内部生产状况的目的。

  17. Wireless sensor network for sodium leak detection

    International Nuclear Information System (INIS)

    Highlights: ► Early detection of sodium leak is mandatory in any reactor handling liquid sodium. ► Wireless sensor networking technology has been introduced for detecting sodium leak. ► We designed and developed a wireless sensor node in-house. ► We deployed a pilot wireless sensor network for handling nine sodium leak signals. - Abstract: To study the mechanical properties of Prototype Fast Breeder Reactor component materials under the influence of sodium, the IN Sodium Test (INSOT) facility has been erected and commissioned at Indira Gandhi Centre for Atomic Research. Sodium reacts violently with air/moisture leading to fire. Hence early detection of sodium leak if any is mandatory for such plants and almost 140 sodium leak detectors are placed throughout the loop. All these detectors are wired to the control room for data collection and monitoring. To reduce the cost, space and maintenance that are involved in cabling, the wireless sensor networking technology has been introduced in the sodium leak detection system of INSOT. This paper describes about the deployment details of the pilot wireless sensor network and the measures taken for the successful deployment.

  18. Integrating Wireless Networking for Radiation Detection

    Science.gov (United States)

    Board, Jeremy; Barzilov, Alexander; Womble, Phillip; Paschal, Jon

    2006-10-01

    As wireless networking becomes more available, new applications are being developed for this technology. Our group has been studying the advantages of wireless networks of radiation detectors. With the prevalence of the IEEE 802.11 standard (``WiFi''), we have developed a wireless detector unit which is comprised of a 5 cm x 5 cm NaI(Tl) detector, amplifier and data acquisition electronics, and a WiFi transceiver. A server may communicate with the detector unit using a TCP/IP network connected to a WiFi access point. Special software on the server will perform radioactive isotope determination and estimate dose-rates. We are developing an enhanced version of the software which utilizes the receiver signal strength index (RSSI) to estimate source strengths and to create maps of radiation intensity.

  19. Emulating Wired Backhaul with Wireless Network Coding

    DEFF Research Database (Denmark)

    Thomsen, Henning; De Carvalho, Elisabeth; Popovski, Petar

    2014-01-01

    In this paper we address the need for wireless network densification. We propose a solution wherein the wired backhaul employed in heterogeneous cellular networks is replaced with wireless links, while maintaining the rate requirements of the uplink and downlink traffic of each user. The first...... component of our solution consists of a two-way, two-phase communication between the macro base station and a user in a small cell through the small cell base station. The second component consists of an optimized adjustment of the transmit power from the macro base station during the multiple access phase......, the uplink traffic to the user, remains identical to the one performed in a wired system. In the broadcast phase, the decoding of the downlink traffic can also be guaranteed to remain identical. Hence, our solution claims an emulation of a wired backhaul with wireless network coding with same performance. We...

  20. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  1. Dynamic Packet Scheduling in Wireless Networks

    OpenAIRE

    Kesselheim, Thomas

    2012-01-01

    We consider protocols that serve communication requests arising over time in a wireless network that is subject to interference. Unlike previous approaches, we take the geometry of the network and power control into account, both allowing to increase the network's performance significantly. We introduce a stochastic and an adversarial model to bound the packet injection. Although taken as the primary motivation, this approach is not only suitable for models based on the signal-to-interference...

  2. Intrusion Detection Systems in Wireless Sensor Networks

    OpenAIRE

    Vijay Kumar Mallarapu; K.V.D.Sagar

    2012-01-01

    Wireless Sensor Networks (WSNs) are a new technology foreseen to be used increasingly in the near future due to their data acquisition and data processing abilities. Security for WSNs is an area that needs to be considered in order to protect the functionality of these networks, the data they convey and the location of their members. The security models & protocols used in wired and other networks are not suited to WSNs because of their severe resource constrictions. In this paper, we describ...

  3. Teamwork and Collaboration in Cognitive Wireless Networks

    OpenAIRE

    Doyle, Linda; NOLAN, KEITH EDWARD

    2007-01-01

    PUBLISHED This article looks at the principles and significant potential of teamwork in cognitive networks. These concepts represent a new evolutionary stage in the development of cognitive radio and cognitive networks, where wireless communication progresses from an individual, device-centric approach toward group and team behavior. This creates the potential for more effective and more robust communication solutions when deemed necessary. The key elements of effective cognitive network t...

  4. Stochastic petri nets for wireless networks

    CERN Document Server

    Lei, Lei; Zhong, Zhangdui

    2015-01-01

    This SpringerBrief presents research in the application of Stochastic Petri Nets (SPN) to the performance evaluation of wireless networks under bursty traffic. It covers typical Quality-of-Service performance metrics such as mean throughput, average delay and packet dropping probability. Along with an introduction of SPN basics, the authors introduce the key motivation and challenges of using SPN to analyze the resource sharing performance in wireless networks. The authors explain two powerful modeling techniques that treat the well-known state space explosion problem: model decomposition and

  5. Future Wireless Networks and Information Systems Volume 1

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in ICFWI 2011 conference. The 2011 International Conference on Future Wireless Networks and Information Systems (ICFWI 2011) has been held on November 30 ~ December 1, 2011, Macao, China. Topics covered include Wireless Information Networks, Wireless Networking Technologies, Mobile Software and Services, intelligent computing, network management, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Wireless Networks and Information Systems and also serve as an excellent reference work for researchers and graduate students working on Wireless Networks and Information Systems.

  6. Network coding at different layers in wireless networks

    CERN Document Server

    2016-01-01

    This book focuses on how to apply network coding at different layers in wireless networks – including MAC, routing, and TCP – with special focus on cognitive radio networks. It discusses how to select parameters in network coding (e.g., coding field, number of packets involved, and redundant information ration) in order to be suitable for the varying wireless environments. The book explores how to deploy network coding in MAC to improve network performance and examines joint network coding with opportunistic routing to improve the successful rate of routing. In regards to TCP and network coding, the text considers transport layer protocol working with network coding to overcome the transmission error rate, particularly with how to use the ACK feedback of TCP to enhance the efficiency of network coding. The book pertains to researchers and postgraduate students, especially whose interests are in opportunistic routing and TCP in cognitive radio networks.

  7. A Comparison Study on Selective Traffic Models with Handoff Management Scheme for Wireless Mobile Network Infrastructure

    Directory of Open Access Journals (Sweden)

    Biswajit Bhowmik

    2013-01-01

    Full Text Available Wireless and Mobile Network Infrastructure services generally examine how different infrastructure providers are positioning themselves to compete in wireless services. These services analyze the opportunities and challenges facing by the infrastructure providers selling to wireless and mobile network operators worldwide. The opportunities and challenges are the review of strategies, market positioning, and future direction in the market for wireless and mobile network infrastructure. The service covers all generations of wireless and mobile network infrastructure: 2G, 2.5G, 3G, and 4G so on global in scope. Majority of the users are mobile while availing these services. Mobility is the most important feature of any wireless and mobile network. Usually, continuous service is achieved by supporting handoff from one cell to another. Poorly designed handoff schemes tend to generate very heavy signaling traffic and, thereby, lead to a dramatic decrease in quality of service. In this paper we make a comparison study on some selective traffic models with priority handoff scheme. The study shows how a handoff procedure has a significant impact on wireless mobile network performance on the basis of two primary criteria – Blocking probability of originating calls and the forced termination probability of ongoing calls. In addition to this the study shows arrival rate of handoff calls, and approximate number of mobile users that get serviced by underlying base station.

  8. Secure Wireless Sensor Networks: Problems and Solutions

    Directory of Open Access Journals (Sweden)

    Fei Hu

    2003-08-01

    Full Text Available As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis was placed on security. This paper analyzes security challenges in wireless sensor networks and summarizes key issues that should be solved for achieving the ad hoc security. It gives an overview of the current state of solutions on such key issues as secure routing, prevention of denial-of-service and key management service. We also present some secure methods to achieve security in wireless sensor networks. Finally we present our integrated approach to securing sensor networks.

  9. A COMPARATIVE STUDY IN WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    Hasan Al-Refai

    2014-02-01

    Full Text Available Sensor networks consist of a large number of small, low-powered wireless nodes with limited computation, communication, and sensing abilities, in a battery-powered sensor network, energy and communication bandwidth are a precious resources. Thus, there is a need to adapt the networking process to match the application in order to minimize the resources consumed and extend the life of the network. In this paper, we introduce a comparative study in different routing algorithms that propose vital solutions to the most important issues that should be taken into account when designing wireless network which are reliability, lifetime, communication bandwidth, transmission rand, and finally the limited energy issue, so we will introduce their algorithms and discuss how did they propose to solve such of these challenges and finally we will do some evaluation to each approach.

  10. Cooperative wireless networks for better green services

    Institute of Scientific and Technical Information of China (English)

    Yang Yang; Zhang Wuxiong; Hu Honglin; Zhang Sihai; Wang Xin; Zhao Haitao; Zhou Wuyang; Wei Jibo

    2011-01-01

    In order to guarantee the overall return on investment ( ROI), improve user experience and quality of service (QoS), save energy, reduce electra magnetic interference (EMI) and radiation pollution, and enable the sustainable deployment of new profitable applications and services in heterogeneous wireless networks coexistence reality, this paper proposes a cross-network cooperation mechanism to effectively share network resources and infrastructures, and then adaptively control and match multi-network energy distribution characteristics according to actual user/service requirements in different geographic areas. Some idle or lightly-loaded base stations ( BS or BSs) will be temporally turned off for saving energy and reducing EMI. Initial simulation results show that the proposed approach can significantly improve the overall energy efficiency and QoS performance across multiple cooperative wireless networks.

  11. Synchronized Data Aggregation for Wireless Sensor Network

    DEFF Research Database (Denmark)

    Dnyaneshwar, Mantri; Prasad, Neeli R.; Prasad, Ramjee

    2014-01-01

    Wireless Sensor Networks (WSNs) are used for monitoring and data collection purposes. A key challenge in effective data collection is to schedule and synchronize the activities of the nodes with global clock. This paper proposes the Synchronized Data Aggregation Algorithm (SDA) using spanning tree...... mechanism. It provides network-wide time synchronization for sensor network. In the initial stage algorithm established the hierarchical structure in the network and then perform the pair - wise synchronization. SDA aggregate data with a global time scale throughout the network. The aggregated packets...

  12. Relieving the Wireless Infrastructure: When Opportunistic Networks Meet Guaranteed Delays

    CERN Document Server

    Whitbeck, John; Leguay, Jérémie; Conan, Vania; de Amorim, Marcelo Dias

    2010-01-01

    Major wireless operators are nowadays facing network capacity issues in striving to meet the growing demands of mobile users. However, 3G-enabled devices increasingly benefit from ad hoc radio connectivity (e.g., Wi-Fi). In this context of hybrid connectivity, we propose Push-and-track, a content dissemination framework that harnesses ad hoc communication opportunities to minimize the load on the wireless infrastructure while guaranteeing tight delivery delays. It achieves this through a control loop that collects user-sent acknowledgements to determine if new copies need to be reinjected into the network through the 3G interface. Push-and-Track includes multiple strategies to determine how many copies of the content should be injected and to whom. The short delay-tolerance of common content, such as news or road traffic updates, make them suitable for such a system. Based on a realistic large-scale vehicular dataset from the city of Bologna composed of more than 10,000 vehicles, we demonstrate that Push-and-...

  13. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  14. An Integrated Mobile Phone Payment System Based on 3G Network

    OpenAIRE

    Weihui Dai; Xiang Cai; Haifeng Wu; Weidong Zhao; Xuan Li

    2011-01-01

    Along with globally approaching of the 3G era, the progress of mobile communication technology and the development of mobile terminal devices will rapidly promote the mobilization development of traditional E-commerce. In order to ensure it to achieve further development, secure, flexible and reliable mobile payment system is becoming more and more important. Compared with the payment pattern of ordinary commerce, there will be profound changes in the mobile payment, such as special payment c...

  15. Wireless Network Communications Overview for Space Mission Operations

    Science.gov (United States)

    Fink, Patrick W.

    2009-01-01

    The mission of the On-Board Wireless Working Group (WWG) is to serve as a general CCSDS focus group for intra-vehicle wireless technologies. The WWG investigates and makes recommendations pursuant to standardization of applicable wireless network protocols, ensuring the interoperability of independently developed wireless communication assets. This document presents technical background information concerning uses and applicability of wireless networking technologies for space missions. Agency-relevant driving scenarios, for which wireless network communications will provide a significant return-on-investment benefiting the participating international agencies, are used to focus the scope of the enclosed technical information.

  16. The Evolution of IDS Solutions in Wireless Ad-Hoc Networks To Wireless Mesh Networks

    OpenAIRE

    Novarun Deb; Manali Chakraborty; Nabendu Chaki

    2011-01-01

    The domain of wireless networks is inherently vulnerable to attacks due to the unreliable wireless medium. Such networks can be secured from intrusions using either prevention or detection schemes. This paper focuses its study on intrusion detection rather than prevention of attacks. As attackers keep onimprovising too, an active prevention method alone cannot provide total security to the system. Here in lies the importance of intrusion detection systems (IDS) that are solely designed to de...

  17. Study on Channel Estimate and Joint Detection in 3G Network

    Directory of Open Access Journals (Sweden)

    Yanchun Shen

    2012-04-01

    Full Text Available In order to study the contribution of the channel estimation and joint measuring technology on the third generation mobile communications (3G, the channel estimation and joint detection model of the 3G system has been installed to analyze the channel estimation approaches grounded on emergency setups and training sequence. Pulse shaping filtering has been conducted by operations such as QPSK baseband modulation and Spread Spectrum on the User Data Source; then to channel estimate and joint measure the data received from base station via the Additive White Gaussian Noise channel. In line with the simulation results, with the increase of signal to noise ratio,the impulse response graph of the signal via the Steiner Estimator channel levels with that via the noise-free channel. Zero Forcing Block Linear Equalizer (ZF-BLE has a good effect on eliminating the multipath interference and the inter-symbol interference in the system, which prove the good effects on the 3G system of using both the channel estimation technology of the Steiner Estimator and the joint measuring technology of the ZF-BLE, which is of good application prospects.

  18. Wireless Network Security Vulnerabilities and Concerns

    Science.gov (United States)

    Mushtaq, Ahmad

    The dilemma of cyber communications insecurity has existed all the times since the beginning of the network communications. The problems and concerns of unauthorized access and hacking has existed form the time of introduction of world wide web communication and Internet's expansion for popular use in 1990s, and has remained till present time as one of the most important issues. The wireless network security is no exception. Serious and continuous efforts of investigation, research and development has been going on for the last several decades to achieve the goal of provision of 100 percent or full proof security for all the protocols of networking architectures including the wireless networking. Some very reliable and robust strategies have been developed and deployed which has made network communications more and more secure. However, the most desired goal of complete security has yet to see the light of the day. The latest Cyber War scenario, reported in the media of intrusion and hacking of each other's defense and secret agencies between the two super powers USA and China has further aggravated the situation. This sort of intrusion by hackers between other countries such as India and Pakistan, Israel and Middle East countries has also been going on and reported in the media frequently. The paper reviews and critically examines the strategies already in place, for wired network. Wireless Network Security and also suggests some directions and strategies for more robust aspects to be researched and deployed.

  19. Problem solving for wireless sensor networks

    CERN Document Server

    Garcia-Hernando, Ana-Belen; Lopez-Navarro, Juan-Manuel; Prayati, Aggeliki; Redondo-Lopez, Luis

    2008-01-01

    Wireless Sensor Networks (WSN) is an area of huge research interest, attracting substantial attention from industry and academia for its enormous potential and its inherent challenges. This reader-friendly text delivers a comprehensive review of the developments related to the important technological issues in WSN.

  20. WIRELESS SENSOR NETWORK BASED CONVEYOR SURVEILLANCE SYSTEM

    OpenAIRE

    Attila Trohák; Máté Kolozsi-Tóth; Péter Rádi

    2011-01-01

    In the paper we will introduce an intelligent conveyor surveillance system. We started a research project to design and develop a conveyor surveillance system based on wireless sensor network and GPRS communication. Our system is able to measure temperature on fixed and moving, rotating surfaces and able to detect smoke. We would like to introduce the developed devices and give an application example.

  1. Deploying a Wireless Sensor Network in Iceland

    OpenAIRE

    K.; Martinez; Hart, J. K.; Ong, R.

    2009-01-01

    A wireless sensor network deployment on a glacier in Iceland is described. The system uses power management as well as power harvesting to provide long-term environment sensing. Advances in base station and sensor node design as well as initial results are described.

  2. Clock Synchronization for Multihop Wireless Sensor Networks

    Science.gov (United States)

    Solis Robles, Roberto

    2009-01-01

    In wireless sensor networks, more so generally than in other types of distributed systems, clock synchronization is crucial since by having this service available, several applications such as media access protocols, object tracking, or data fusion, would improve their performance. In this dissertation, we propose a set of algorithms to achieve…

  3. Performance of TCP/IP/ UDP adaptive header compression algorithm for wireless network

    Directory of Open Access Journals (Sweden)

    Prof.N.Penchalaiah

    2010-08-01

    Full Text Available The convergence of mobile technologies will characterize the future telecommunication systems based on TCP/IP protocols. These Protocols can be used to build both wired and wireless parts on same platform. But TCP/IP headers overheads are large, so it utilizes more bandwidth even small services, whose payload is small. So it definitely needheader compression to save bandwidth, as we know bandwidth is the most expensive and scared resource in wireless systems.There are many approaches used to compress the headers overloads. Most commonly used approaches are, an adaptive robust TCP/IP header compression lgorithm for 3G wireless networks and an adaptive robust header compression algorithm based on UDP-RTS/CTS handshake for real-timestreams in wireless networks such a 3G platforms. But these approaches are not efficient in adaptive nature. So In this paper we are proposing one approach to solve the problem efficiently even in adaptive nature. The aim of this algorithm is to adjust the dimension of Variable Sliding Window (VSW in W-LSB encoding with the accurate estimation of wireless channel state to achieve the good balance of compression ratio and error-resistant robustness for the adaptive use in wireless link. We present simulation results that demonstrate theeffectiveness of this adaptive algorithm over wireless link and comparative study of existing approaches

  4. An Isolation Intrusion Detection System for Hierarchical Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Rung-Ching Chen

    2010-03-01

    Full Text Available Normal 0 0 2 false false false MicrosoftInternetExplorer4 A wireless sensor network (WSN is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor environmental conditions, such as battlefield data and personal health information, and some environment limited resources. To avoid malicious damage is important while information is transmitted in wireless network. Thus, Wireless Intrusion Detection Systems are crucial to safe operation in wireless sensor networks. Wireless networks are subject to very different types of attacks compare to wired networks. In this paper, we propose an isolation table to detect intrusion by hierarchical wireless sensor networks and to estimate the effect of intrusion detection. The primary experiment proves that isolation table intrusion detection can prevent attacks effectively.

  5. Survey of propagation Model in wireless Network

    OpenAIRE

    Hemant Kumar Sharma; Sanjeev Sharma; Krishna Kumar Pandey

    2011-01-01

    To implementation of mobile ad hoc network wave propagation models are necessary to determine propagation characteristic through a medium. Wireless mobile ad hoc networks are self creating and self organizing entity. Propagation study provides an estimation of signal characteristics. Accurate prediction of radio propagation behaviour for MANET is becoming a difficult task. This paper presents investigation of propagation model. Radio wave propagation mechanisms are absorption, reflection, ref...

  6. Advanced routing protocols for wireless networks

    CERN Document Server

    Campista , Miguel Elias Mitre

    2014-01-01

    This text introduces the principles of routing protocols and metrics as they affect wireless networking environments, specifically in urban areas. Timely because of the recent rise in small city life, this topic includes the consideration of ad hoc, mesh, vehicular, sensor, and delay tolerant networks. These approaches are each unique, and author Miguel Mitre Campista provides a thorough, but accessible, explanation of their individual characteristics for engineers, computer scientists, IT professionals, and curious Internet users.

  7. Security Analysis in Wireless Sensor Networks

    OpenAIRE

    Murat Dener

    2014-01-01

    In recent years, wireless sensor network (WSN) is employed in many application areas such as monitoring, tracking, and controlling. For many applications of WSN, security is an important requirement. However, security solutions in WSN differ from traditional networks due to resource limitation and computational constraints. This paper analyzes security solutions: TinySec, IEEE 802.15.4, SPINS, MiniSEC, LSec, LLSP, LISA, and LISP in WSN. The paper also presents characteristics, security requir...

  8. Performance Analysis of Asynchronous Multicarrier Wireless Networks

    OpenAIRE

    Lin, Xingqin; Jiang, Libin; Andrews, Jeffrey G.

    2014-01-01

    This paper develops a novel analytical framework for asynchronous wireless networks deploying multicarrier transmission. Nodes in the network have different notions of timing, so from the viewpoint of a typical receiver, the received signals from different transmitters are asynchronous, leading to a loss of orthogonality between subcarriers. We first develop a detailed link-level analysis based on OFDM, based on which we propose a tractable system-level signal-to-interference-plus-noise ratio...

  9. Review of Wireless Sensor Networks- Architecture and Applications

    OpenAIRE

    Mr. Kuntal Saroha; Mrs. Ruchika Lochab; Mr. Puneet Garg

    2011-01-01

    Wireless sensor networks (WSN) are currently receiving significant attention due to their unlimited potential. A wireless sensor network is a collection of nodes organized into a cooperative network. Each node consists of processing capability. In this Paper, I Concentrate on Architecture and the applications of Wireless SensorNetworks .I have also mentioned future scope of WSN. The network must possess self-organizing capabilities since thepositions of individual nodes are not predetermined.

  10. Design of PCB ground planer for 3G wireless terminal%3G无线终端高密度PCB的地平面设计

    Institute of Scientific and Technical Information of China (English)

    林峰; 王筑; 黄学达

    2011-01-01

    高密度互联(high density interconnection,HDI)印刷电路板(printed circuit board,PCB)设计中,地平面直接影响着整个电路性能和电磁兼容性能(electro magnetic compatibility,EMC).良好的地平面设计可降低杂散电感引起的噪声,有助于降低信号间串扰、反射和电磁干扰.基于3G无线终端电路实例,探讨了HDI PCB中的地平面设计,并提出了地平面的分割和缝合法,以及全屏蔽措施.实验证明,采用该方法设计的3G无线终端,EMC得到大幅改善,射频指标得到显著提高.%During the high density interconnection printed circuit board design, the ground planer has an effect on the Electro Magnetic Compatibility of the entire circuit. The proper design of ground planer can minimize noise caused by currents switching through stray inductance, help to reduce noise caused by crosstalk and reflections, and help to control noise emitted outside the system. This paper discusses the design of ground planer in HDI PCB,bases on a 3G wireless terminal circuit, and also gives a method of ground planer splitting or sewing,and a method of entire shield. By using these methods, the EMC of 3G wireless terminal is optimized, and the RF characteristic is also improved greatly.

  11. Game theory for wireless communications and networking

    CERN Document Server

    Zhang, Yan

    2011-01-01

    Used to explain complicated economic behavior for decades, game theory is quickly becoming a tool of choice for those serious about optimizing next generation wireless systems. Illustrating how game theory can effectively address a wide range of issues that until now remained unresolved, Game Theory for Wireless Communications and Networking provides a systematic introduction to the application of this powerful and dynamic tool. This comprehensive technical guide explains game theory basics, architectures, protocols, security, models, open research issues, and cutting-edge advances and applica

  12. Wireless Local Area Networks: The Next Evolutionary Step.

    Science.gov (United States)

    Wodarz, Nan

    2001-01-01

    The Institute of Electrical and Electronics Engineers recently approved a high-speed wireless standard that enables devices from different manufacturers to communicate through a common backbone, making wireless local area networks more feasible in schools. Schools can now use wireless access points and network cards to provide flexible…

  13. Distributed Estimation, Coding, and Scheduling in Wireless Visual Sensor Networks

    Science.gov (United States)

    Yu, Chao

    2013-01-01

    In this thesis, we consider estimation, coding, and sensor scheduling for energy efficient operation of wireless visual sensor networks (VSN), which consist of battery-powered wireless sensors with sensing (imaging), computation, and communication capabilities. The competing requirements for applications of these wireless sensor networks (WSN)…

  14. Partition-based Network Load Balanced Routing in Large Scale Multi-sink Wireless Sensor Networks

    NARCIS (Netherlands)

    Mutter, T.F.

    2009-01-01

    Traditional wireless networks form the wireless counterpart of wired networks, in which providing infrastructure is the main functionality. High bandwidth is the primary goal and the unlimited power supply is an important characteristic of traditional wireless networks. On the other hand, Wireless S

  15. Wireless sensor networks principles, design and applications

    CERN Document Server

    Yang, Shuang-Hua

    2014-01-01

    Wireless Sensor Networks presents the latest practical solutions to the design issues presented in wireless-sensor-network-based systems. Novel features of the text, distributed throughout, include workable solutions, demonstration systems and case studies of the design and application of wireless sensor networks (WSNs) based on the first-hand research and development experience of the author, and the chapters on real applications: building fire safety protection; smart home automation; and logistics resource management. Case studies and applications illustrate the practical perspectives of: ·         sensor node design; ·         embedded software design; ·         routing algorithms; ·         sink node positioning; ·         co-existence with other wireless systems; ·         data fusion; ·         security; ·         indoor location tracking; ·         integrating with radio-frequency identification; and ·         In...

  16. Wireless Sensor Network for Medical Applications

    Directory of Open Access Journals (Sweden)

    Hanady S.Ahmed

    2015-06-01

    Full Text Available This work presents a healthcare monitoring system that can be used in an intensive care room. Biological information represented by ECG signals is achieved by ECG acquisition part . AD620 Instrumentation Amplifier selected due to its low current noise. The ECG signals of patients in the intensive care room are measured through wireless nodes. A base node is connected to the nursing room computer via a USB port , and is programmed with a specific firmware. The ECG signals are transferred wirelessly to the base node using nRF24L01+ wireless module. So, the nurse staff has a real time information for each patient available in the intensive care room. A star Wireless Sensor Network is designed for collecting ECG signals . ATmega328 MCU in the Arduino Uno board used for this purpose. Internet for things used For transferring ECG signals to the remote doctor, a Virtual Privet Network is established to connect the nursing room computer and the doctor computer . So, the patients information kept secure. Although the constructed network is tested for ECG monitoring, but it can be used to monitor any other signals.

  17. An underwater optical wireless communication network

    Science.gov (United States)

    Arnon, Shlomi

    2009-08-01

    The growing need for underwater observation and sub-sea monitoring systems has stimulated considerable interest in advancing the enabling technologies of underwater wireless communication and underwater sensor networks. This communication technology is expected to play an important role in investigating climate change, in monitoring biological, bio-geochemical, evolutionary and ecological changes in the sea, ocean and lake environments and in helping to control and maintain oil production facilities and harbors using unmanned underwater vehicles (UUVs), submarines, ships, buoys, and divers. However, the present technology of underwater acoustic communication cannot provide the high data rate required to investigate and monitor these environments and facilities. Optical wireless communication has been proposed as the best alternative to meet this challenge. We present models of three kinds of optical wireless communication links a) a line-of-sight link, b) a modulating retro-reflector link and c) a reflective link, all of which can provide the required data rate. We analyze the link performance based on these models. From the analysis, it is clear that as the water absorption increases, the communication performance decreases dramatically for the three link types. However, by using the scattered lighted it was possible to mitigate this decrease in some cases. We conclude from the analysis that a high data rate underwater optical wireless network is a feasible solution for emerging applications such as UUV to UUV links and networks of sensors, and extended ranges in these applications could be achieved by applying a multi-hop concept.

  18. Quality of service in wireless networks over unlicensed spectrum

    CERN Document Server

    Nahrstedt, Klara

    2011-01-01

    This Synthesis Lecture presents a discussion of Quality of Service (QoS) in wireless networks over unlicensed spectrum. The topic is presented from the point of view of protocols for wireless networks (e.g., 802.11) rather than the physical layer point of view usually discussed for cellular networks in the licensed wireless spectrum. A large number of mobile multimedia wireless applications are being deployed over WiFi (IEEE 802.11) and Bluetooth wireless networks and the number will increase in the future as more phones, tablets, and laptops are equipped with these unlicensed spectrum wireles

  19. Mobility Prediction in Wireless Ad Hoc Networks using Neural Networks

    CERN Document Server

    Kaaniche, Heni

    2010-01-01

    Mobility prediction allows estimating the stability of paths in a mobile wireless Ad Hoc networks. Identifying stable paths helps to improve routing by reducing the overhead and the number of connection interruptions. In this paper, we introduce a neural network based method for mobility prediction in Ad Hoc networks. This method consists of a multi-layer and recurrent neural network using back propagation through time algorithm for training.

  20. Worm Epidemics in Wireless Adhoc Networks

    CERN Document Server

    Nekovee, Maziar

    2007-01-01

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet.

  1. Worm epidemics in wireless ad hoc networks

    Science.gov (United States)

    Nekovee, Maziar

    2007-06-01

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet.

  2. Worm epidemics in wireless ad hoc networks

    International Nuclear Information System (INIS)

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet

  3. Cross-platform wireless sensor network development

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg; Kusy, Branislav

    Design and development of wireless sensor network applications adds an additional layer of complexity to traditional computer systems. The developer needs to be an expert in resource constrained embedded devices as well as traditional desktop computers. We propose Tinylnventor, an open-source dev......Design and development of wireless sensor network applications adds an additional layer of complexity to traditional computer systems. The developer needs to be an expert in resource constrained embedded devices as well as traditional desktop computers. We propose Tinylnventor, an open......-source development environment that takes a holistic approach to implementing sensor network applications. Users build applications using a drag-and-drop visual programming language Open Blocks, a language that Google selected for its App Inventor for Android. Tinylnventor uses cross-platform programming concepts...

  4. MotionCast for mobile wireless networks

    CERN Document Server

    Wang, Xinbing

    2013-01-01

    MotionCast for Mobile Wireless Networks provides an overview on the research for mobile ad-hoc networks regarding capacity and connectivity. Wireless ad-hoc networks are useful when there is a lack of infrastructure for communication. The proposed notion “MotionCast” is for the capacity analysis of multicast in MANET. A new kind of connectivity (k;m)-connectivity, is also defined, and its critical transmission range for i.i.d. (independently and identically distributed) and random walk mobility models are derived respectively. This book also investigates the related issues of connectivity in mobile and static circumstances. In addition, it provides a survey of the capacity scaling research, which gives a good summary of this field.

  5. Wireless Sensor Network Architectures for Different Systems

    Directory of Open Access Journals (Sweden)

    Sanjeev Narayan Bal

    2012-08-01

    Full Text Available Recent technological advances enabled the design andproliferation of wireless sensor networks capable ofautonomously monitoring and controlling environments. Oneof the most promising applications of sensor networks is forhuman health monitoring. The wireless body area networkspromise to revolutionize health monitoring. Within a smartbuilding many sensors and actuators are interconnected to forma control system. Here a web services-based approach tointegrate resource constrained sensor and actuator nodes intoIP-based networks. A key feature of this approach is itscapability for automatic service discovery. IntelligentVehicular Systems (IVSs emerged as a potential candidate forbenefiting from the unique features and capabilities of WSNs.In IVSs, transportation infrastructure is supported with theingenious achievements of computer and informationtechnology to resolve severe situations like traffic congestionand cope with emergency conditions like major accidents.

  6. Priority image transmission in wireless sensor networks

    International Nuclear Information System (INIS)

    The emerging technology during the last years allowed the development of new sensors equipped with wireless communication which can be organized into a cooperative autonomous network. Some application areas for wireless sensor networks (WSNs) are home automations, health care services, military domain, and environment monitoring. The required constraints are limited capacity of processing, limited storage capability, and especially these nodes are limited in energy. In addition, such networks are tiny battery powered which their lifetime is very limited. During image processing and transmission to the destination, the lifetime of sensor network is decreased quickly due to battery and processing power constraints. Therefore, digital image transmissions are a significant challenge for image sensor based Wireless Sensor Networks (WSNs). Based on a wavelet image compression, we propose a novel, robust and energy-efficient scheme, called Priority Image Transmission (PIT) in WSN by providing various priority levels during image transmissions. Different priorities in the compressed image are considered. The information for the significant wavelet coeffcients are transmitted with higher quality assurance, whereas relatively less important coefficients are transmitted with lower overhead. Simulation results show that the proposed scheme prolongs the system lifetime and achieves higher energy efficiency in WSN with an acceptable compromise on the image quality.

  7. Analyzing Multimode Wireless Sensor Networks Using the Network Calculus

    Directory of Open Access Journals (Sweden)

    Xi Jin

    2015-01-01

    Full Text Available The network calculus is a powerful tool to analyze the performance of wireless sensor networks. But the original network calculus can only model the single-mode wireless sensor network. In this paper, we combine the original network calculus with the multimode model to analyze the maximum delay bound of the flow of interest in the multimode wireless sensor network. There are two combined methods A-MM and N-MM. The method A-MM models the whole network as a multimode component, and the method N-MM models each node as a multimode component. We prove that the maximum delay bound computed by the method A-MM is tighter than or equal to that computed by the method N-MM. Experiments show that our proposed methods can significantly decrease the analytical delay bound comparing with the separate flow analysis method. For the large-scale wireless sensor network with 32 thousands of sensor nodes, our proposed methods can decrease about 70% of the analytical delay bound.

  8. Wireless Sensor Network Handles Image Data

    Science.gov (United States)

    2008-01-01

    To relay data from remote locations for NASA s Earth sciences research, Goddard Space Flight Center contributed to the development of "microservers" (wireless sensor network nodes), which are now used commercially as a quick and affordable means to capture and distribute geographical information, including rich sets of aerial and street-level imagery. NASA began this work out of a necessity for real-time recovery of remote sensor data. These microservers work much like a wireless office network, relaying information between devices. The key difference, however, is that instead of linking workstations within one office, the interconnected microservers operate miles away from one another. This attribute traces back to the technology s original use: The microservers were originally designed for seismology on remote glaciers and ice streams in Alaska, Greenland, and Antarctica-acquiring, storing, and relaying data wirelessly between ground sensors. The microservers boast three key attributes. First, a researcher in the field can establish a "managed network" of microservers and rapidly see the data streams (recovered wirelessly) on a field computer. This rapid feedback permits the researcher to reconfigure the network for different purposes over the course of a field campaign. Second, through careful power management, the microservers can dwell unsupervised in the field for up to 2 years, collecting tremendous amounts of data at a research location. The third attribute is the exciting potential to deploy a microserver network that works in synchrony with robotic explorers (e.g., providing ground truth validation for satellites, supporting rovers as they traverse the local environment). Managed networks of remote microservers that relay data unsupervised for up to 2 years can drastically reduce the costs of field instrumentation and data rec

  9. Data aggregation in wireless sensor networks using the SOAP protocol

    International Nuclear Information System (INIS)

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks

  10. STUDY OF SECURITY ISSUES IN WIRELESS SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    MANJU.V.C

    2011-10-01

    Full Text Available In recent years, the design and implementation of the wireless sensor networks is widely chosen for research as sensor networks enable application that connects the physical world to the virtual world. Wireless platforms are less expensive and are more powerful, with usage in enabling the promise health science to military sensing operations. The wireless sensor networks are prone to more attacks than wired networks. However, the hardware simplicity of these devices makes defense mechanisms designed for traditional networksinfeasible. This paper studies the security aspects of wireless sensor networks. A survey with current threats and countermeasures is carried out, in particular, explored the protocol layer attack on sensor networks.

  11. Data aggregation in wireless sensor networks using the SOAP protocol

    Energy Technology Data Exchange (ETDEWEB)

    Al-Yasiri, A; Sunley, A [School of Computing, Science and Engineering, University of Salford, Greater Manchester, M5 4WT (United Kingdom)

    2007-07-15

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks.

  12. Efficient data communication protocols for wireless networks

    Science.gov (United States)

    Zeydan, Engin

    In this dissertation, efficient decentralized algorithms are investigated for cost minimization problems in wireless networks. For wireless sensor networks, we investigate both the reduction in the energy consumption and throughput maximization problems separately using multi-hop data aggregation for correlated data in wireless sensor networks. The proposed algorithms exploit data redundancy using a game theoretic framework. For energy minimization, routes are chosen to minimize the total energy expended by the network using best response dynamics to local data. The cost function used in routing takes into account distance, interference and in-network data aggregation. The proposed energy-efficient correlation-aware routing algorithm significantly reduces the energy consumption in the network and converges in a finite number of steps iteratively. For throughput maximization, we consider both the interference distribution across the network and correlation between forwarded data when establishing routes. Nodes along each route are chosen to minimize the interference impact in their neighborhood and to maximize the in-network data aggregation. The resulting network topology maximizes the global network throughput and the algorithm is guaranteed to converge with a finite number of steps using best response dynamics. For multiple antenna wireless ad-hoc networks, we present distributed cooperative and regret-matching based learning schemes for joint transmit beanformer and power level selection problem for nodes operating in multi-user interference environment. Total network transmit power is minimized while ensuring a constant received signal-to-interference and noise ratio at each receiver. In cooperative and regret-matching based power minimization algorithms, transmit beanformers are selected from a predefined codebook to minimize the total power. By selecting transmit beamformers judiciously and performing power adaptation, the cooperative algorithm is shown to

  13. Wireless Network Coding with Local Network Views: Coded Layer Scheduling

    CERN Document Server

    Vahid, Alireza; Avestimehr, A Salman; Sabharwal, Ashutosh

    2011-01-01

    One of the fundamental challenges in the design of distributed wireless networks is the large dynamic range of network state. Since continuous tracking of global network state at all nodes is practically impossible, nodes can only acquire limited local views of the whole network to design their transmission strategies. In this paper, we study multi-layer wireless networks and assume that each node has only a limited knowledge, namely 1-local view, where each S-D pair has enough information to perform optimally when other pairs do not interfere, along with connectivity information for rest of the network. We investigate the information-theoretic limits of communication with such limited knowledge at the nodes. We develop a novel transmission strategy, namely Coded Layer Scheduling, that solely relies on 1-local view at the nodes and incorporates three different techniques: (1) per layer interference avoidance, (2) repetition coding to allow overhearing of the interference, and (3) network coding to allow inter...

  14. Influence of distortions of key frames on video transfer in wireless networks

    CERN Document Server

    Sagatov, E S; Calyam, P

    2010-01-01

    In this paper it is shown that for substantial increase of video quality in wireless network it is necessary to execute two obligatory points on modernization of the communication scheme. The player on the received part should throw back automatically duplicated RTP packets, server of streaming video should duplicate the packets containing the information of key frames. Coefficients of the mathematical model describing video quality in wireless network have been found for WiFi and 3G standards and codecs MPEG-2 and MPEG-4 (DivX). The special experimental technique which has allowed collecting and processing the data has been developed for calculation of values of factors.

  15. Scalable Video Streaming in Wireless Mesh Networks for Education

    Science.gov (United States)

    Liu, Yan; Wang, Xinheng; Zhao, Liqiang

    2011-01-01

    In this paper, a video streaming system for education based on a wireless mesh network is proposed. A wireless mesh network is a self-organizing, self-managing and reliable intelligent network, which allows educators to deploy a network quickly. Video streaming plays an important role in this system for multimedia data transmission. This new…

  16. Formation And Maintenance of Self-Organizing Wireless Networks

    Science.gov (United States)

    Scott, Keith; Bambos, Nicholas

    1997-01-01

    There are numerous military, commercial, and scientific applications for mobile wireless networks which are able to self-Organize without recousre to any pre-existing infrastructure. We present the Self Organizing Wireless Adaptive Network protocol, a distributed networking protocol capable of managing such networks.

  17. Maximizing lifetime of wireless sensor networks using genetic approach

    DEFF Research Database (Denmark)

    Wagh, Sanjeev; Prasad, Ramjee

    2014-01-01

    The wireless sensor networks are designed to install the smart network applications or network for emergency solutions, where human interaction is not possible. The nodes in wireless sensor networks have to self organize as per the users requirements through monitoring environments. As the sensor......-objective parameters are considered to solve the problem using genetic algorithm of evolutionary approach....

  18. 47 CFR 90.1405 - Shared wireless broadband network.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Shared wireless broadband network. 90.1405... broadband network. The Shared Wireless Broadband Network developed by the 700 MHz Public/Private Partnership must be designed to meet requirements associated with a nationwide, public safety broadband network....

  19. Internet roaming: a WLAN/3G integration system for enterprises

    Science.gov (United States)

    Luo, Hui; Jiang, Zhimei; Kim, Byoung J.; Shankar, Narendra K.; Henry, Paul

    2002-08-01

    This paper proposes an enterprise-oriented WLAN/3G network integration solution, called the Internet Roaming system. Differing from other operator-oriented WLAN/3G network integration solutions, the Internet Roaming system is a practical IP-based corporate network architecture that provides seamless internetworking across office WLAN, home WLAN, public WLAN, and 2.5G/3G cellular network for corporate wireless data users. An Internet Roaming system may have four building blocks. They are IRC (Internet Roaming Client), SMG (secure mobility gateway), SIA (Secure IP Access) gateway, and VSA (virtual single account) server. The IRC is a special client tool (software or hardware) installed on a wireless data device. It provides a secure mobile IP connection from the wireless data device to the corporate network transparent to the operating system of the wireless data devices. The SMG is a mobile IPsec gateway installed on the corporate core network facing the Internet. It works with the IRC to maintain a secure mobile IP connection when the wireless data device is connected on the Internet through a home WLAN, a public WLAN, or a cellular network. The SIA server is a special IPsec gateway installed on the corporate intranet where office WLAN is installed. It works with the IRC to assure the security of office WLAN while improving the routing efficiency for users computers. The VSA server manages the IRC, SMG, and SIA servers.

  20. One Kind of Routing Algorithm Modified in Wireless Sensor Network

    OpenAIRE

    Wei Ni Ni; Song Yi

    2016-01-01

    The wireless sensor networks are the emerging next generation sensor networks, Routing technology is the wireless sensor network communication layer of the core technology. To build reliable paths in wireless sensor networks, we can consider two ways: providing multiple paths utilizing the redundancy to assure the communication reliability or constructing transmission reliability mechanism to assure the reliability of every hop. Braid multipath algorithm and ReInforM routing algorithm are the...

  1. STUDY OF SECURITY ISSUES IN WIRELESS SENSOR NETWORK

    OpenAIRE

    MANJU.V.C

    2011-01-01

    In recent years, the design and implementation of the wireless sensor networks is widely chosen for research as sensor networks enable application that connects the physical world to the virtual world. Wireless platforms are less expensive and are more powerful, with usage in enabling the promise health science to military sensing operations. The wireless sensor networks are prone to more attacks than wired networks. However, the hardware simplicity of these devices makes defense mechanisms d...

  2. Power distribution and performance analysis for wireless communication networks

    CERN Document Server

    Zhao, Dongmei

    2012-01-01

    This book provides an analysis of transmission power and network performance in different wireless communication networks. It presents the latest research and techniques for power and interference control and performance modeling in wireless communication networks with different network topologies, air interfaces, and transmission techniques. While studying the power distributions and resource management, the reader will also learn basic methodology and skills for problem formulations, can ascertain the complexity for designing radio resource management strategies in modern wireless communicat

  3. Wireless sensor networks distributed consensus estimation

    CERN Document Server

    Chen, Cailian; Guan, Xinping

    2014-01-01

    This SpringerBrief evaluates the cooperative effort of sensor nodes to accomplish high-level tasks with sensing, data processing and communication. The metrics of network-wide convergence, unbiasedness, consistency and optimality are discussed through network topology, distributed estimation algorithms and consensus strategy. Systematic analysis reveals that proper deployment of sensor nodes and a small number of low-cost relays (without sensing function) can speed up the information fusion and thus improve the estimation capability of wireless sensor networks (WSNs). This brief also investiga

  4. DMT of Wireless Networks: An overview

    OpenAIRE

    Vinodh, K; Kumar, Vijay P; Lalitha, V; Prakash, N

    2010-01-01

    The e�cient operation of single-source, single-sink wireless network is considered with the diversity-multiplexing gain tradeo� (DMT) as the measure of performance. Whereas in the case of a point-to-point MIMO channel the DMT is determined by the fading statistics, in the case of a network, the DMT is additionally, a function of the time schedule according to which the network is operated, as well as the protocol that dictates the mode of operation of the intermediate relays.In general,...

  5. Security for multi-hop wireless networks

    CERN Document Server

    Mahmoud, Mohamed M E A

    2014-01-01

    This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally. Also included is a new, efficient cooperation incentive scheme to stimulate the selfish nodes to relay information packets and enforce fairness. Many examples are provided, along with predictions for future directions of the field. Security

  6. Intrusion Detection Systems in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Vijay Kumar Mallarapu

    2012-01-01

    Full Text Available Wireless Sensor Networks (WSNs are a new technology foreseen to be used increasingly in the near future due to their data acquisition and data processing abilities. Security for WSNs is an area that needs to be considered in order to protect the functionality of these networks, the data they convey and the location of their members. The security models & protocols used in wired and other networks are not suited to WSNs because of their severe resource constrictions. In this paper, we describe various threats to WSN and then examine existing approaches to identify these threats. Finally, we propose an intrusion detection mechanism based on these existing approaches to identifying threats.

  7. Key Management in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  8. An Intelligent Handover Management System for Future Generation Wireless Networks

    Directory of Open Access Journals (Sweden)

    Kassar Meriem

    2008-01-01

    Full Text Available Abstract Future generation wireless networks should provide to mobile users the best connectivity to services anywhere at anytime. The most challenging problem is the seamless intersystem/vertical mobility across heterogeneous wireless networks. In order to answer it, a vertical handover management system is needed. In our paper, we propose an intelligent solution answering user requirements and ensuring service continuity. We focus on a vertical handover decision strategy based on the context-awareness concept. The given strategy chooses the appropriate time and the most suitable access network among those available to perform a handover. It uses advanced decision algorithms (for more efficiency and intelligence and it is governed by handover policies as decision rules (for more flexibility and optimization. To maintain a seamless service continuity, handover execution is based on mobile IP functionalities. We study our decision system in a case of a 3G/UMTS-WLAN scenario and we discuss all the handover decision issues in our solution.

  9. Coal mine gas monitoring system based on wireless sensor network

    Institute of Scientific and Technical Information of China (English)

    WANG Jian; WANG Ru-lin; WANG Xue-min; SHEN Chuan-he

    2007-01-01

    Based on the nowadays'condition.it is urgent that the gas detection cable communication system must be replaced by the wireless communication systems.The wireless sensors distributed in the environment can achieve the intelligent gas monitoring system.Apply with multilayer data fuse to design working tactics,and import the artificial neural networks to analyze detecting result.The wireless sensors system communicates with the controI center through the optical fiber cable.All the gas sensor nodes distributed in coal mine are combined into an intelligent,flexible structure wireless network system.forming coal mine gas monitoring system based on wireless sensor network.

  10. High fidelity wireless network evaluation for heterogeneous cognitive radio networks

    Science.gov (United States)

    Ding, Lei; Sagduyu, Yalin; Yackoski, Justin; Azimi-Sadjadi, Babak; Li, Jason; Levy, Renato; Melodia, Tammaso

    2012-06-01

    We present a high fidelity cognitive radio (CR) network emulation platform for wireless system tests, measure- ments, and validation. This versatile platform provides the configurable functionalities to control and repeat realistic physical channel effects in integrated space, air, and ground networks. We combine the advantages of scalable simulation environment with reliable hardware performance for high fidelity and repeatable evaluation of heterogeneous CR networks. This approach extends CR design only at device (software-defined-radio) or lower-level protocol (dynamic spectrum access) level to end-to-end cognitive networking, and facilitates low-cost deployment, development, and experimentation of new wireless network protocols and applications on frequency- agile programmable radios. Going beyond the channel emulator paradigm for point-to-point communications, we can support simultaneous transmissions by network-level emulation that allows realistic physical-layer inter- actions between diverse user classes, including secondary users, primary users, and adversarial jammers in CR networks. In particular, we can replay field tests in a lab environment with real radios perceiving and learning the dynamic environment thereby adapting for end-to-end goals over distributed spectrum coordination channels that replace the common control channel as a single point of failure. CR networks offer several dimensions of tunable actions including channel, power, rate, and route selection. The proposed network evaluation platform is fully programmable and can reliably evaluate the necessary cross-layer design solutions with configurable op- timization space by leveraging the hardware experiments to represent the realistic effects of physical channel, topology, mobility, and jamming on spectrum agility, situational awareness, and network resiliency. We also provide the flexibility to scale up the test environment by introducing virtual radios and establishing seamless signal

  11. Wireless Communication Networks' Planning in Underdeveloped Countries%Wireless Communication Networks' Planning in Underdeveloped Countries

    Institute of Scientific and Technical Information of China (English)

    XU Rui

    2012-01-01

    The planning of wireless communication networks in underdeveloped countries is studied for landline telephone, fixed broadband wireless access and PLMN systems via investigation and discussion of the LDC networks' characteristic, technology selection, deployment consideration, network configuring, civil work evaluation and investment estimation. An example is embedded all through providing a general

  12. COGRADNET: UBIQUITOUS HETEROGENEOUS WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    MOHD HASBULLAH OMAR

    2009-06-01

    Full Text Available Mobile radio systems have shown rapid growth and hence increase the awareness for more efficient use of spectrum. With the advancements of technology, the development of radio systems that is dynamic and efficient in terms of spectrum usage can be realized. Cognitive radio system is one of the advancement that enhanced the adaptive capabilities of the systems that make the usage of spectrum more efficient, versatile and flexible. It also able to adapt their operations based on its internal and external factors by sensing its environment. The cognitive radio systems may be a solution for the spectrum scarcity faced by developer to tackle the issue of signal propagation and bigger coverage for broadband internet access. This paper will addressed the cognitive radio technology for ubiquitous broadband wireless internet access.

  13. Caching Eliminates the Wireless Bottleneck in Video Aware Wireless Networks

    Directory of Open Access Journals (Sweden)

    Andreas F. Molisch

    2014-01-01

    Full Text Available Wireless video is the main driver for rapid growth in cellular data traffic. Traditional methods for network capacity increase are very costly and do not exploit the unique features of video, especially asynchronous content reuse. In this paper we give an overview of our work that proposed and detailed a new transmission paradigm exploiting content reuse and the widespread availability of low-cost storage. Our network structure uses caching in helper stations (femtocaching and/or devices, combined with highly spectrally efficient short-range communications to deliver video files. For femtocaching, we develop optimum storage schemes and dynamic streaming policies that optimize video quality. For caching on devices, combined with device-to-device (D2D communications, we show that communications within clusters of mobile stations should be used; the cluster size can be adjusted to optimize the tradeoff between frequency reuse and the probability that a device finds a desired file cached by another device in the same cluster. In many situations the network throughput increases linearly with the number of users, and the tradeoff between throughput and outage is better than in traditional base-station centric systems. Simulation results with realistic numbers of users and channel conditions show that network throughput can be increased by two orders of magnitude compared to conventional schemes.

  14. Secure Communication in Stochastic Wireless Networks

    CERN Document Server

    Pinto, Pedro C; Win, Moe Z

    2010-01-01

    Information-theoretic security -- widely accepted as the strictest notion of security -- relies on channel coding techniques that exploit the inherent randomness of the propagation channels to significantly strengthen the security of digital communications systems. Motivated by recent developments in the field, this paper aims at a characterization of the fundamental secrecy limits of wireless networks. Based on a general model in which legitimate nodes and potential eavesdroppers are randomly scattered in space, the intrinsically secure communications graph (iS-graph) is defined from the point of view of information-theoretic security. Conclusive results are provided for the local connectivity of the Poisson iS-graph, in terms of node degrees and isolation probabilities. It is shown how the secure connectivity of the network varies with the wireless propagation effects, the secrecy rate threshold of each link, and the noise powers of legitimate nodes and eavesdroppers. Sectorized transmission and eavesdroppe...

  15. Multiple Antenna Secure Broadcast over Wireless Networks

    CERN Document Server

    Liu, Ruoheng

    2007-01-01

    In wireless data networks, communication is particularly susceptible to eavesdropping due to its broadcast nature. Security and privacy systems have become critical for wireless providers and enterprise networks. This paper considers the problem of secret communication over the Gaussian broadcast channel, where a multi-antenna transmitter sends independent confidential messages to two users with perfect secrecy. That is, each user would like to obtain its own message reliably and confidentially. First, a computable Sato-type outer bound on the secrecy capacity region is provided for a multi-antenna broadcast channel with confidential messages. Next, a dirty-paper secure coding scheme and its simplified version are described. For each case, the corresponding achievable rate region is derived under the perfect secrecy requirement. Finally, two numerical examples demonstrate that the Sato-type outer bound is consistent with the boundary of the simplified dirty-paper coding secrecy rate region.

  16. SITRUS: Semantic Infrastructure for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kalil A. Bispo

    2015-10-01

    Full Text Available Wireless sensor networks (WSNs are made up of nodes with limited resources, such as processing, bandwidth, memory and, most importantly, energy. For this reason, it is essential that WSNs always work to reduce the power consumption as much as possible in order to maximize its lifetime. In this context, this paper presents SITRUS (semantic infrastructure for wireless sensor networks, which aims to reduce the power consumption of WSN nodes using ontologies. SITRUS consists of two major parts: a message-oriented middleware responsible for both an oriented message communication service and a reconfiguration service; and a semantic information processing module whose purpose is to generate a semantic database that provides the basis to decide whether a WSN node needs to be reconfigurated or not. In order to evaluate the proposed solution, we carried out an experimental evaluation to assess the power consumption and memory usage of WSN applications built atop SITRUS.

  17. Wireless data over RAM's Mobitex network

    Science.gov (United States)

    Khan, M. Mobeen

    1995-12-01

    Mobitex is a mobile data technology standard created by Eritel, now a wholly owned subsidiary of Ericsson, that has been in existence for about a decade. Originally designed as a low speed (1.2 kbps) data system with a voice dispatch overlay, it was significantly enhanced in 1990 for use in North America and the UK. The enhanced system is a data-only system using cellular architecture and multi-channel frequency reuse, store-and-forward capability, and an 8 kbps over-the-air data rate. The mission of RAM Mobile Data USA Limited Partnership ('RAM') is to provide high quality, cost efficient, wireless data communications solutions in its targeted market segments. RAM's Mobitex network is currently one of the two networks providing two way wireless data services nationwide using a long distance service provider of the customer's choice.

  18. Localization in Wireless Networks Foundations and Applications

    CERN Document Server

    Sanford, Jessica Feng; Slijepcevic, Sasha

    2012-01-01

    In a computational tour-de-force, this volume wipes away a host of problems related to location discovery in wireless ad-hoc sensor networks. WASNs have recognized potential in many applications that are location-dependent, yet are heavily constrained by factors such as cost and energy consumption. Their “ad-hoc” nature, with direct rather than mediated connections between a network of wireless devices, adds another layer of difficulty.   Basing this work entirely on data-driven, coordinated algorithms, the authors' aim is to present location discovery techniques that are highly accurate—and which fit user criteria. The research deploys nonparametric statistical methods and relies on the concept of joint probability to construct error (including location error) models and environmental field models. It also addresses system issues such as the broadcast and scheduling of the beacon. Reporting an impressive accuracy gain of almost 17 percent, and organized in a clear, sequential manner, this book represe...

  19. SITRUS: Semantic Infrastructure for Wireless Sensor Networks.

    Science.gov (United States)

    Bispo, Kalil A; Rosa, Nelson S; Cunha, Paulo R F

    2015-01-01

    Wireless sensor networks (WSNs) are made up of nodes with limited resources, such as processing, bandwidth, memory and, most importantly, energy. For this reason, it is essential that WSNs always work to reduce the power consumption as much as possible in order to maximize its lifetime. In this context, this paper presents SITRUS (semantic infrastructure for wireless sensor networks), which aims to reduce the power consumption of WSN nodes using ontologies. SITRUS consists of two major parts: a message-oriented middleware responsible for both an oriented message communication service and a reconfiguration service; and a semantic information processing module whose purpose is to generate a semantic database that provides the basis to decide whether a WSN node needs to be reconfigurated or not. In order to evaluate the proposed solution, we carried out an experimental evaluation to assess the power consumption and memory usage of WSN applications built atop SITRUS. PMID:26528974

  20. A novel compound chaotic block cipher for wireless sensor networks

    Science.gov (United States)

    Tong, Xiao-Jun; Wang, Zhu; Liu, Yang; Zhang, Miao; Xu, Lianjie

    2015-05-01

    The nodes of wireless sensor network (WSN) have limited calculation and communication ability. Traditional encryption algorithms need large amounts of resources, so they cannot be applied to the wireless sensor network. To solve this problem, this paper proposes a block cipher algorithm for wireless sensor network based on compound chaotic map. The algorithm adopts Feistel network and constructs a Cubic function including discretized chaotic map, and its key is generated by the compound chaotic sequence. Security and performance tests show that the algorithm has high security and efficiency, low resource depletion. So the novel chaotic algorithm is suitable for the wireless sensor networks.

  1. Consideration of using 3G cellular network to monitor ABB’s remote circuit breakers

    OpenAIRE

    Afolabi, Ibrahim

    2013-01-01

    Increase in the energy demand for domestic purposes as well as in the manufactur-ing industries has led to a rapid and proportional increase in the electrical energy production today. In meeting this huge electric consumption and demand, proper network and supply of electric power has to be in place from the electric energy generation stations to the final user i.e. the consumers at home, in offices and heavy manufacturing industries. Achieving this goal without mincing safety and securit...

  2. Towards Self-Powered Wireless Sensor Networks

    OpenAIRE

    SPENZA, DORA

    2013-01-01

    Ubiquitous computing aims at creating smart environments in which computational and communication capabilities permeate the word at all scales, improving the human experience and quality of life in a totally unobtrusive yet completely reliable manner. According to this vision, an huge variety of smart devices and products (e.g., wireless sensor nodes, mobile phones, cameras, sensors, home appliances and industrial machines) are interconnected to realize a network of distributed agents that co...

  3. Distributed Cooperative Caching In Social Wireless Network

    OpenAIRE

    Dimple Pandya; Manan Shah

    2014-01-01

    This paper introduces cooperative caching techniques for reducing electronic content provisioning cost in Social Wireless Networks (SWNET).SWNETs are formed by mobile devices, such as modern cell phones etc. sharing common takings in electronic content, and actually meeting together in public places. Electronic object caching in such SWNETs are shown to be able to reduce the content provisioning cost which depends heavily on the service and pricing dependences among various stakeholders inclu...

  4. Security Overview of Wireless Sensor Network

    OpenAIRE

    Modares, Hero; Moravejosharieh, Amirhossein; Salleh, Rosli; Lloret, Jaime

    2013-01-01

    There are several types of security threats that can give rise to vulnerability issues and performance degradation for the Wireless Sensor Network (WSN). The existing protocols that incorporate security features for authentication, key management, and secure routing, have not able to protect the WSN, effectively but a new Intrusion Detection System (IDS) can overcome these problems. The IDS collects data for analysis in order to identify any abnormal behaviour at the sensor nodes, which if pr...

  5. Geographic Wormhole Detection in Wireless Sensor Networks

    OpenAIRE

    Mehdi Sookhak; Adnan Akhundzada; Alireza Sookhak; Mohammadreza Eslaminejad; Abdullah Gani; Muhammad Khurram Khan; Xiong Li; Xiaomin Wang

    2015-01-01

    Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly susceptible to a number of security attacks. Denial of Service (DoS) attack is considered the most dominant and a major threat to WSNs. Moreover, the wormhole attack represents one of the potential forms of the Denial of Service (DoS) attack. Besides, crafting the wormhole attack is comparatively simple; though, its detection is nontrivial. On the contrary, the extant wormhole defense methods need both special...

  6. Source localization using wireless sensor networks

    OpenAIRE

    Tan, Kok Sin Stephen

    2006-01-01

    Wireless sensors can be worn on soldiers or installed on vehicles to form distributed sensor networks to locate the source of sniper fire. A two-step source localization process is proposed for this sniper detection task. The time difference of arrival (TDOA) for the acoustic signals received by the sensors is first estimated using the generalized cross correlation (GCC) method. The estimated TDOA values are then used by the hybrid spherical interpolation/maximum likelihood (SI/ML) estimation...

  7. EESA Algorithm in Wireless Sensor Networks

    OpenAIRE

    Pei Zhang; Lu Feng

    2014-01-01

    Since there are many problems of traditional extended clustering algorithm in wireless sensor network like short extended time, over energy consumption, too many deviated position the of cluster head nodes and so on, this paper proposes the EESA algorithm. The algorithm makes many improvements on the way of dividing clusters, strategy of electing the cluster head and construction method of data relay path, the two aspects of inter-cluster energy balance and energy balance among the cluster ar...

  8. Experiment of Wireless Sensor Network to Monitor Field Data

    Directory of Open Access Journals (Sweden)

    Kwang Sik Kim

    2009-08-01

    Full Text Available Recently the mobile wireless network has been drastically enhanced and one of the most efficient ways to realize the ubiquitous network will be to develop the converged network by integrating the mobile wireless network with other IP fixed network like NGN (Next Generation Network. So in this paper the term of the wireless ubiquitous network is used to describe this approach. In this paper, first, the wireless ubiquitous network architecture is described based on IMS which has been standardized by 3GPP (3rd Generation Partnership Program. Next, the field data collection system to match the satellite data using location information is proposed based on the concept of the wireless ubiquitous network architecture. The purpose of the proposed system is to provide more accurate analyzing method with the researchers in the remote sensing area.

  9. Key handling in wireless sensor networks

    International Nuclear Information System (INIS)

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided

  10. Simultaneity Analysis In A Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Malović Miodrag

    2015-06-01

    Full Text Available An original wireless sensor network for vibration measurements was designed. Its primary purpose is modal analysis of vibrations of large structures. A number of experiments have been performed to evaluate the system, with special emphasis on the influence of different effects on simultaneity of data acquired from remote nodes, which is essential for modal analysis. One of the issues is that quartz crystal oscillators, which provide time reading on the devices, are optimized for use in the room temperature and exhibit significant frequency variations if operated outside the 20–30°C range. Although much research was performed to optimize algorithms of synchronization in wireless networks, the subject of temperature fluctuations was not investigated and discussed in proportion to its significance. This paper describes methods used to evaluate data simultaneity and some algorithms suitable for its improvement in small to intermediate size ad-hoc wireless sensor networks exposed to varying temperatures often present in on-site civil engineering measurements.

  11. Performance of International roaming Location Update in 3G and 4G networks

    OpenAIRE

    Moshirian, Sanaz

    2015-01-01

    Since Mobile network operator (MNO) relies on many Business Support Systems (BSS) and Operation Support Systems (OSS) it should be assured that operator’s systems supports the requirements of the future.This thesis shall focus on the “start-to-end” aspects that must be considered to ensure that International Roaming continues to operate flawless. The thesis experience Long Term Evolution (LTE) in case of international roaming by measuring the end to end location update delay.In order to evalu...

  12. Cognitive radio wireless sensor networks: applications, challenges and research trends.

    Science.gov (United States)

    Joshi, Gyanendra Prasad; Nam, Seung Yeob; Kim, Sung Won

    2013-08-22

    A cognitive radio wireless sensor network is one of the candidate areas where cognitive techniques can be used for opportunistic spectrum access. Research in this area is still in its infancy, but it is progressing rapidly. The aim of this study is to classify the existing literature of this fast emerging application area of cognitive radio wireless sensor networks, highlight the key research that has already been undertaken, and indicate open problems. This paper describes the advantages of cognitive radio wireless sensor networks, the difference between ad hoc cognitive radio networks, wireless sensor networks, and cognitive radio wireless sensor networks, potential application areas of cognitive radio wireless sensor networks, challenges and research trend in cognitive radio wireless sensor networks. The sensing schemes suited for cognitive radio wireless sensor networks scenarios are discussed with an emphasis on cooperation and spectrum access methods that ensure the availability of the required QoS. Finally, this paper lists several open research challenges aimed at drawing the attention of the readers toward the important issues that need to be addressed before the vision of completely autonomous cognitive radio wireless sensor networks can be realized.

  13. Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends

    Directory of Open Access Journals (Sweden)

    Gyanendra Prasad Joshi

    2013-08-01

    Full Text Available A cognitive radio wireless sensor network is one of the candidate areas where cognitive techniques can be used for opportunistic spectrum access. Research in this area is still in its infancy, but it is progressing rapidly. The aim of this study is to classify the existing literature of this fast emerging application area of cognitive radio wireless sensor networks, highlight the key research that has already been undertaken, and indicate open problems. This paper describes the advantages of cognitive radio wireless sensor networks, the difference between ad hoc cognitive radio networks, wireless sensor networks, and cognitive radio wireless sensor networks, potential application areas of cognitive radio wireless sensor networks, challenges and research trend in cognitive radio wireless sensor networks. The sensing schemes suited for cognitive radio wireless sensor networks scenarios are discussed with an emphasis on cooperation and spectrum access methods that ensure the availability of the required QoS. Finally, this paper lists several open research challenges aimed at drawing the attention of the readers toward the important issues that need to be addressed before the vision of completely autonomous cognitive radio wireless sensor networks can be realized.

  14. A Survey on Wireless Sensor Network Security

    CERN Document Server

    Sen, Jaydip

    2010-01-01

    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.

  15. Interference Mitigation in Large Random Wireless Networks

    CERN Document Server

    Aldridge, Matthew

    2011-01-01

    A central problem in the operation of large wireless networks is how to deal with interference -- the unwanted signals being sent by transmitters that a receiver is not interested in. This thesis looks at ways of combating such interference. In Chapters 1 and 2, we outline the necessary information and communication theory background, including the concept of capacity. We also include an overview of a new set of schemes for dealing with interference known as interference alignment, paying special attention to a channel-state-based strategy called ergodic interference alignment. In Chapter 3, we consider the operation of large regular and random networks by treating interference as background noise. We consider the local performance of a single node, and the global performance of a very large network. In Chapter 4, we use ergodic interference alignment to derive the asymptotic sum-capacity of large random dense networks. These networks are derived from a physical model of node placement where signal strength d...

  16. Security in wireless sensor networks

    CERN Document Server

    Oreku, George S

    2016-01-01

    This monograph covers different aspects of sensor network security including new emerging technologies. The authors present a mathematical approach to the topic and give numerous practical examples as well as case studies to illustrate the theory. The target audience primarily comprises experts and practitioners in the field of sensor network security, but the book may also be beneficial for researchers in academia as well as for graduate students.

  17. Wireless sensor network for monitoring soil moisture and weather conditions

    Science.gov (United States)

    A wireless sensor network (WSN) was developed and deployed in three fields to monitor soil water status and collect weather data for irrigation scheduling. The WSN consists of soil-water sensors, weather sensors, wireless data loggers, and a wireless modem. Soil-water sensors were installed at three...

  18. Sending policies in dynamic wireless mesh using network coding

    DEFF Research Database (Denmark)

    Pandi, Sreekrishna; Fitzek, Frank; Pihl, Jeppe;

    2015-01-01

    This paper demonstrates the quick prototyping capabilities of the Python-Kodo library for network coding based performance evaluation and investigates the problem of data redundancy in a network coded wireless mesh with opportunistic overhearing. By means of several wireless meshed architectures ...... of appropriate relays. Finally, various sending policies that can be employed by the nodes in order to improve the overall transmission efficiency in a dynamic wireless mesh network are discussed and their performance is analysed on the constructed simulation setup....

  19. Distance based (DBCP) Cluster Protocol for Heterogeneous Wireless Sensor Network

    OpenAIRE

    Kumar, Surender; Prateek, Manish; Bhushan, Bharat

    2014-01-01

    Clustering is an important concept to reduce the energy consumption and prolonging the life of a wireless sensor network. In heterogeneous wireless sensor network some of the nodes are equipped with more energy than the other nodes. Many routing algorithms are proposed for heterogeneous wireless sensor network. Stable Election Protocol (SEP) is one of the important protocol in this category. In this research paper a novel energy efficient distance based cluster protocol (DBCP) is proposed for...

  20. On Narrowband Interference Mitigation Methods for Robust Wireless Sensor Networks

    OpenAIRE

    Moussavinik, Hessam

    2013-01-01

    In this dissertation different approaches to robustness in ultra wideband (UWB) wireless sensor networks, specifically biomedical applications, are studied. UWB wireless sensor networks are unlicensed users of the frequency spectrum and they can be interfered by signals from other licensed users/devices that are generally narrowband signals. Due to the relatively high power of narrowband interferences (NBI) UWB wireless sensor networks can strongly get affected and loose their performance. Th...

  1. Architecture and Routing Protocols for Smart Wireless Home Sensor Networks

    OpenAIRE

    Yang Xu; Shuai Wu; Ruochen Tan; Zheng Chen; Min Zha; Tina Tsou

    2013-01-01

    As an important application domain of wireless sensor networks (WSN), wireless home sensor network (WHSN) can be built as a traditional WSN. However, when we consider its own character that plug-in sensors are fixed with AC power supply while mobile sensors are battery powered, traditional WSN techniques do not match well. In this paper, we propose a smart wireless home sensor network architecture with improved routing protocols. It is a hierarchical architecture in which AC-powered sensors a...

  2. Zone Based Routing Protocol for Homogeneous Wireless Sensor Network

    OpenAIRE

    Taruna, S; Jain Kusum Lata; Purohit G.N

    2011-01-01

    Wireless Sensor Networks, are made of low-cost, low -power, small in size, and multifunctional sensor nodes. The efficient energy utilization is one of t he important performance factors for wireless senso r networks survivability be-cause nodes operate with limited battery power. In this paper we propose and analyze a new approach of zone based clustering hea d selection algorithm for wireless sensor network o f hom...

  3. Ant colony based routing in wireless sensor networks

    OpenAIRE

    Varnika Bains; Kanchan Sharma

    2012-01-01

    Wireless Sensor Networks comprises of small sensor nodes communicating with each other in a network topology which keeps on varying. The wireless sensor nodes also known as motes have limited energy resources along with constraints on its computational and storage capabilities. Due to these restrictions coupled with its dynamic topology, routing in Wireless Sensor Networks (WSN) is a very challenging task. Routing protocols for WSN’s have to ensure reliable multi-hop communication under thes...

  4. Energy Efficient Load Balanced Routing Protocol for Wireless Sensor Networks

    OpenAIRE

    Alghanmi Ali Omar; ChongGun Kim

    2014-01-01

    Due to the enormous applications of wireless sensor s, the research on wireless sensor networks remains active throughout the past two decades. Bec ause of miniaturization of sensor nodes and their limited batteries, the energy efficiency and energy balancing are the demand in-need to extend the life time of sensor networks. This study proposes an energy-aware directional routing protocol for stationary wireless sensor network. Th e routing ...

  5. Smart parking service based on wireless sensor networks

    OpenAIRE

    Yang, Jihoon; Portilla Berrueco, Jorge; Riesgo Alcaide, Teresa

    2012-01-01

    n this paper, we present the design and implementation of a prototype system of Smart Parking Services based on Wireless Sensor Networks (WSNs) that allows vehicle drivers to effectively find the free parking places. The proposed scheme consists of wireless sensor networks, embedded web-server, central web-server and mobile phone application. In the system, low-cost wireless sensors networks modules are deployed into each parking slot equipped with one sensor node. The state of the parking sl...

  6. Security Analysis of Routing Protocols in Wireless Sensor Networks

    OpenAIRE

    Mohammad Sadeghi; Farshad Khosravi; Kayvan Atefi; Mehdi Barati

    2012-01-01

    In this paper, I describe briefly some of the different types of attacks on wireless sensor networks such as Sybil, HELLO, Wormhole and Sinkhole attacks. Then I describe security analysis of some major routing protocols in wireless sensor network such as Directed Diffusion, TinyOS beaconing, geographic and Rumor routings in term of attacks and security goals. As a result I explain some secure routing protocols for wireless sensor network and is discussed briefly some methods and policy of the...

  7. SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORK

    OpenAIRE

    Mohammad Alwadi; Girija Chetty

    2015-01-01

    In this paper, we propose a novel energy efficient environment monitoring scheme for wireless sensor networks, based on data mining formulation. The proposed adapting routing scheme for sensors for achieving energy efficiency from temperature wireless sensor network data set. The experimental validation of the proposed approach using publicly available Intel Berkeley lab Wireless Sensor Network dataset shows that it is possible to achieve energy efficient environment monitoring fo...

  8. Industrial wireless sensor networks applications, protocols, and standards

    CERN Document Server

    Güngör, V Çagri

    2013-01-01

    The collaborative nature of industrial wireless sensor networks (IWSNs) brings several advantages over traditional wired industrial monitoring and control systems, including self-organization, rapid deployment, flexibility, and inherent intelligent processing. In this regard, IWSNs play a vital role in creating more reliable, efficient, and productive industrial systems, thus improving companies' competitiveness in the marketplace. Industrial Wireless Sensor Networks: Applications, Protocols, and Standards examines the current state of the art in industrial wireless sensor networks and outline

  9. An Improved Wireless Sensor Network Routing Algorithm

    Institute of Scientific and Technical Information of China (English)

    Shengmei Luo; Xue Li; Yiai Jin; Zhixin Sun

    2015-01-01

    High performance with low power consumption is an essential factor in wireless sensor networks (WSN). In order to address the issue on the lifetime and the consumption of nodes in WSNs, an improved ad hoc on⁃demand distance vector rout⁃ing (IAODV) algorithm is proposed based on AODV and LAR protocols. This algorithm is a modified on⁃demand routing al⁃gorithm that limits data forwarding in the searching domain, and then chooses the route on basis of hop count and power consumption. The simulation results show that the algorithm can effectively reduce power consumption as well as prolong the network lifetime.

  10. AN Enhanced SINR-Based Call Admission Control in 3G Networks

    Directory of Open Access Journals (Sweden)

    Moses Ekpenyong

    2011-11-01

    Full Text Available This paper presents the signal-to-interference plus noise ratio (SINR-based call admission control (CAC as an effective technique that guarantees signal quality for admitted users. We propose a CAC model that admits users as long as the SINR exceeds a threshold (th SINR . To reduce blocking, we ensure that the threshold level is maintained at a lower bound (lb thSINR −, convenient to keep the blocking probability ( Pb below a maximum value ( Pb−max. We simulate the CAC model with the Java programming language and evaluate the performance of the model. Simulation results show that our CAC scheme produce the expected performance that improves the network quality.

  11. CONVERGING MULTIDOMAIN SERVICES IN AN IMS ENVIRONMENT FOR IPTV AND 3G NETWORKS

    Directory of Open Access Journals (Sweden)

    Juan Carlos Plaza

    2011-06-01

    Full Text Available Convergent service environments are required to deal with current tendency to heterogeneity in networkcontents and its inherent incorporation of more types of devices demanding services from multiple domains. Efficient management architectures are required to tackle issues regarding: media content, subscriber reachability and subscriptions information coming from different types of networks in order to enable well organized communications among different environments such as: IMS, IPTv and subscribers management repositories. This paper describes the work of Eureka Mobicome project on the definition of an architecture to manage and provide services among distinct service delivery platforms (IPTV and ENUM using IMS as a common core and proposes a compound modular architecture to set the basis for Future Internet converging service provision. The proposed architecture has been validated by the Interconnection of different prototypes deployed at Madrid (Spain and Oslo (Norway.

  12. A Wireless Communications Laboratory on Cellular Network Planning

    Science.gov (United States)

    Dawy, Z.; Husseini, A.; Yaacoub, E.; Al-Kanj, L.

    2010-01-01

    The field of radio network planning and optimization (RNPO) is central for wireless cellular network design, deployment, and enhancement. Wireless cellular operators invest huge sums of capital on deploying, launching, and maintaining their networks in order to ensure competitive performance and high user satisfaction. This work presents a lab…

  13. Energy Efficient RFID Technique for Wireless Sensor Network- A Review

    OpenAIRE

    Bhawna Mannan; Harmanjot Singh

    2014-01-01

    A wireless sensor network is a technology that provides monitoring. Wireless sensor play an important role in the processing of structural response data. This network also has some design issues. These issues become benchmark during deployment of the network. Energy consumption is also a design issue which we will discussed in this paper. GPS master will be deployed to overcome this problem.

  14. Simple, Reliable, Scalable and Energy Efficient Wireless Sensor Networks

    NARCIS (Netherlands)

    Guo, C.

    2010-01-01

    Wireless communication and networking technology has facilitated people to be connected with each other closely. Cellular network is evolving now from the third generation to the fourth generation. In the meanwhile we are experiencing the demand for wireless networks which can facilitate the communi

  15. Statistical modeling and analysis of interference in wireless networks

    NARCIS (Netherlands)

    Wildemeersch, Matthias

    2013-01-01

    In current wireless networks, interference is the main performance-limiting factor. The quality of a wireless link depends on the signal and interference power, which is strongly related to the spatial distribution of the concurrently transmitting network nodes, shortly denominated as the network ge

  16. The Systems Librarian: Implementing Wireless Networks without Compromising Security

    Science.gov (United States)

    Breeding, Marshall

    2005-01-01

    Many libraries are or soon will be offering Wi-Fi, also known as wireless networks. The largest perceived barriers to providing this service are concerns about security. The prime rule when deploying Wi-Fi is segregation, having a clear separation between a public wireless network and the rest of the library?s network. A number of devices can be…

  17. SECURE AND AUTHENTICATED SOURCE ROUTING IN WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    Mukesh Singla

    2012-09-01

    Full Text Available Wireless networking is today’s glamour technology. Wecan hardly pick up a technology publication withoutencountering articles extolling its virtues or excoriating itsfaults. Wireless networking refers to technology thatenables two or more computers to communicate usingstandard network protocols, but without network cabling. Ifa user, application or company wishes to make dataportable, mobile and accessible then wireless networking isthe answer. A wireless networking system would rid of thedowntime you would normally have in a wired network dueto cable problems. It would also save time and money dueto the fact that you would spare the expense of installing alot of cables. Also, if a client computer needs to relocate toanother part of the office then all you need to do is movethe machine with the wireless network card [1].

  18. Wireless body sensor networks for health-monitoring applications

    International Nuclear Information System (INIS)

    Current wireless technologies, such as wireless body area networks and wireless personal area networks, provide promising applications in medical monitoring systems to measure specified physiological data and also provide location-based information, if required. With the increasing sophistication of wearable and implantable medical devices and their integration with wireless sensors, an ever-expanding range of therapeutic and diagnostic applications is being pursued by research and commercial organizations. This paper aims to provide a comprehensive review of recent developments in wireless sensor technology for monitoring behaviour related to human physiological responses. It presents background information on the use of wireless technology and sensors to develop a wireless physiological measurement system. A generic miniature platform and other available technologies for wireless sensors have been studied in terms of hardware and software structural requirements for a low-cost, low-power, non-invasive and unobtrusive system. (topical review)

  19. Energy Efficient Distributed Data Fusion In Multihop Wireless Sensor Networks

    OpenAIRE

    Huang, Yi

    2010-01-01

    This thesis addresses a transmission energy problem for wireless sensor networks. There are two types of wireless sensor networks. One is single-hop sensor network where data from each sensor is directly transmitted to a fusion center, and the other is multihop sensor network where data is relayed through adjacent sensors. In the absence of a moving agent for data collection, multihop sensor network is typically much more energy efficient than single-hop sensor network since the former avoids...

  20. Expected Transmission Energy Route Metric for Wireless Mesh Senor Networks

    Directory of Open Access Journals (Sweden)

    YanLiang Jin

    2011-01-01

    Full Text Available Mesh is a network topology that achieves high throughput and stable intercommunication. With great potential, it is expected to be the key architecture of future networks. Wireless sensor networks are an active research area with numerous workshops and conferences arranged each year. The overall performance of a WSN highly depends on the energy consumption of the network. This paper designs a new routing metric for wireless mesh sensor networks. Results from simulation experiments reveal that the new metric algorithm improves the energy balance of the whole network and extends the lifetime of wireless mesh sensor networks (WMSNs.

  1. Flight Testing of Wireless Networking for Nanosat Launch Vehicles Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The innovation proposed here addresses the testing and evaluation of wireless networking technologies for small launch vehicles by leveraging existing nanosat...

  2. Intelligent Devices in Rural Wireless Networks

    Directory of Open Access Journals (Sweden)

    Daniel FUENTES

    2014-03-01

    Full Text Available The rural wireless networks are increasingly in demand by associations and autarchies to expand Internet access in this type of areas. The problem of such solutions centers not only in network deployment and its maintenance, but also in the equipment installation on clients, which always has big costs. This installation and configuration must be performed by a technician on site, so that the equipment can be integrated in the infrastructure. To try to mitigate this problem, it is presented a solution that allows the clients to install, with transparency, the device at home, reducing not only the cost for the management entity but also for the clients. This way, for info-excluded people or with new technology low experience level, it is the user that integrates himself in the network, making him part of the process, fostering the network usage.In this article are specified not only the system architecture but also the way that it works and how it obtains the desirable result. The tests made to the solution show the quickness, reliability and autonomy in the execution of the tasks, making it a benefit for rural wireless networks.This solution, by its robustness and simplicity, allowed an uptake to the IT by people who never thought to do it, namely an advanced age group (elderly who want to join the world of the new technologies

  3. Heterogeneous LEACH Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nishi Sharma

    2013-07-01

    Full Text Available Wireless Sensor Networks are networks of large number of tiny, battery powered sensor nodes having limited on-board storage, processing, and radio capabilities. Nodes sense and send their reports toward a processing center which is called base station. Since this transmission and reception process consumes lots of energy as compare to data processing, Designing protocols and applications for such networks has to be energy aware in order to prolong the lifetime of the network. Generally, real life applications deal with such Heterogeneity rather than Homogeneity. In this paper, a protocol is proposed, which is heterogeneous in energy. We analyze the basic distributed clustering routing protocol LEACH (Low Energy Adaptive Clustering Hierarchy, which is a homogeneous system, and then we study the impact of heterogeneity in energy of nodes to prolong the life time of WSN. Simulation results using MATLAB shows that the proposed Leach-heterogeneous system significantly reduces energy consumption and increase the total lifetime of the wireless sensor network.

  4. Applying physical layer network coding in wireless networks

    CERN Document Server

    Shengli, Zhang

    2009-01-01

    A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes, simultaneously. Rather than a blessing, this feature is treated more as an interference-inducing nuisance in most wireless networks today (e.g., IEEE 802.11). This paper shows that the concept of network coding can be applied at the physical layer to turn the broadcast property into a capacity-boosting advantage in wireless ad hoc networks. Specifically, we propose a physical-layer network coding (PNC) scheme to coordinate transmissions among nodes. In contrast to "straightforward" network coding which performs coding arithmetic on digital bit streams after they have been received, PNC makes use of the additive nature of simultaneously arriving electromagnetic (EM) waves for equivalent coding operation. And in doing so, PNC can potentially achieve 100% and 50% throughput incre...

  5. Mechanisms for Prolonging Network Lifetime in Wireless Sensor Networks

    Science.gov (United States)

    Yang, Yinying

    2010-01-01

    Sensors are used to monitor and control the physical environment. A Wireless Sensor Network (WSN) is composed of a large number of sensor nodes that are densely deployed either inside the phenomenon or very close to it [18][5]. Sensor nodes measure various parameters of the environment and transmit data collected to one or more sinks, using…

  6. Graphical Model Theory for Wireless Sensor Networks

    Energy Technology Data Exchange (ETDEWEB)

    Davis, William B.

    2002-12-08

    Information processing in sensor networks, with many small processors, demands a theory of computation that allows the minimization of processing effort, and the distribution of this effort throughout the network. Graphical model theory provides a probabilistic theory of computation that explicitly addresses complexity and decentralization for optimizing network computation. The junction tree algorithm, for decentralized inference on graphical probability models, can be instantiated in a variety of applications useful for wireless sensor networks, including: sensor validation and fusion; data compression and channel coding; expert systems, with decentralized data structures, and efficient local queries; pattern classification, and machine learning. Graphical models for these applications are sketched, and a model of dynamic sensor validation and fusion is presented in more depth, to illustrate the junction tree algorithm.

  7. Wireless traffic steering for green cellular networks

    CERN Document Server

    Zhang, Shan; Zhou, Sheng; Niu, Zhisheng; Shen, Xuemin (Sherman)

    2016-01-01

    This book introduces wireless traffic steering as a paradigm to realize green communication in multi-tier heterogeneous cellular networks. By matching network resources and dynamic mobile traffic demand, traffic steering helps to reduce on-grid power consumption with on-demand services provided. This book reviews existing solutions from the perspectives of energy consumption reduction and renewable energy harvesting. Specifically, it explains how traffic steering can improve energy efficiency through intelligent traffic-resource matching. Several promising traffic steering approaches for dynamic network planning and renewable energy demand-supply balancing are discussed. This book presents an energy-aware traffic steering method for networks with energy harvesting, which optimizes the traffic allocated to each cell based on the renewable energy status. Renewable energy demand-supply balancing is a key factor in energy dynamics, aimed at enhancing renewable energy sustainability to reduce on-grid energy consum...

  8. Graphical Model Theory for Wireless Sensor Networks

    International Nuclear Information System (INIS)

    Information processing in sensor networks, with many small processors, demands a theory of computation that allows the minimization of processing effort, and the distribution of this effort throughout the network. Graphical model theory provides a probabilistic theory of computation that explicitly addresses complexity and decentralization for optimizing network computation. The junction tree algorithm, for decentralized inference on graphical probability models, can be instantiated in a variety of applications useful for wireless sensor networks, including: sensor validation and fusion; data compression and channel coding; expert systems, with decentralized data structures, and efficient local queries; pattern classification, and machine learning. Graphical models for these applications are sketched, and a model of dynamic sensor validation and fusion is presented in more depth, to illustrate the junction tree algorithm

  9. Energy Consumption in Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    JIN Yan; WANG Ling; YANG Xiao-zong; WEN Dong-xin

    2007-01-01

    Wireless sensor networks (WSNs) can be used to collect surrounding data by multi-hop. As sensor networks have the constrained and not rechargeable energy resource, energy efficiency is an important design issue for its topology. In this paper, the energy consumption issue under the different topology is studied. We derive the exact mathematical expression of energy consumption for the fiat and clustering scheme, respectively. Then the energy consumptions of different schemes are compared. By the comparison, multi-level clustering scheme is more energy efficient in large scale networks. Simulation results demonstrate that our analysis is correct from the view of prolonging the large-scale network lifetime and achieving more power reductions.

  10. Enhanced Network Throughput of Wireless Network for Digital Video Transmission

    Directory of Open Access Journals (Sweden)

    S.M. Koli

    2013-03-01

    Full Text Available Digital video transmission using wireless technology is an important functionality in multimediacommunication. Such wireless transmission considers various parameters of channel like reliability,quality of service (QoS, transmission rate, transmission delay etc. User datagram protocol (UDP is afast transmission protocol used by most of the real-time applications as it is suitable for delay sensitiveapplications like video and audio transmission. UDP does not provide flow control or error recovery anddoes not require connection management. Since more applications with real-time constraints areintroduced day by day, both over wired and over wireless, some improvements should be made in orderto obtain better end to end performance. This paper surveys the literature on real time communicationover wireless and suggests an intermediate solution providing more reliability in transmission usingadaptive error control mechanism. The idea used is to inject an adaptive amount of redundant packets(RPs in every sent block (or datagram in order to achieve a desired recovery rate at the receiverwithout using any retransmission mechanism. The technique used is called adaptive forward errorcontrol (AFEC and is implemented at physical layer. The network simulator NS-2 is used to evaluateAFEC and the simulation results indicate that the suggested methods can guarantee enhanced networkthroughput for video transmission in the high packet loss wireless network.

  11. High availability of hybrid wireless networks

    Science.gov (United States)

    Leitgeb, Erich; Gebhart, Michael; Birnbacher, Ulla; Kogler, Wolfgang; Schrotter, Peter

    2004-09-01

    Free Space Optical (FSO) links offer high bandwidth and the flexibility of wireless communication links. However, the availability of FSO links is limited by weather patterns like fog and heavy snowfall. Microwave based communication links operating at high frequencies (40 - 43 GHz) have similar characteristics like high data rates and needed line-of-sight. Link availability for microwave systems is limited by heavy rain. Combining FSO links with microwave links within a hybrid FSO/microwave communication network has the advantage of added redundancy and higher link availability. Measurements over a period of one year show a combined availability of 99.93% for the climatic region of Graz, Austria) which proves that the combination of both technologies leads to a highly available wireless connection offering high bandwidth.

  12. Frameless ALOHA Protocol for Wireless Networks

    DEFF Research Database (Denmark)

    Stefanovic, Cedomir; Popovski, Petar; Vukobratovic, Dejan

    2012-01-01

    We propose a novel distributed random access scheme for wireless networks based on slotted ALOHA, motivated by the analogies between successive interference cancellation and iterative belief-propagation decoding on erasure channels. The proposed scheme assumes that each user independently accesses...... the wireless link in each slot with a predefined probability, resulting in a distribution of user transmissions over slots. The operation bears analogy with rateless codes, both in terms of probability distributions as well as to the fact that the ALOHA frame becomes fluid and adapted to the current contention...... process. Our aim is to optimize the slot access probability in order to achieve rateless-like distributions, focusing both on the maximization of the resolution probability of user transmissions and the throughput of the scheme....

  13. Reactor building indoor wireless network channel quality estimation using RSSI measurement of wireless sensor network

    International Nuclear Information System (INIS)

    Expanding wireless communication network reception inside reactor buildings (RB) and service wings (SW) has always been a technical challenge for operations service team. This is driven by the volume of metal equipment inside the Reactor Buildings (RB) that blocks and somehow shields the signal throughout the link. In this study, to improve wireless reception inside the Reactor Building (RB), an experimental model using indoor localization mesh based on IEEE 802.15 is developed to implement a wireless sensor network. This experimental model estimates the distance between different nodes by measuring the RSSI (Received Signal Strength Indicator). Then by using triangulation and RSSI measurement, the validity of the estimation techniques is verified to simulate the physical environmental obstacles, which block the signal transmission. (author)

  14. Detecting and Localizing Wireless Network Attacks Techniques

    Directory of Open Access Journals (Sweden)

    Iyad Aldasouqi

    2010-03-01

    Full Text Available In order to increase employee productivity within a feasible budget, we have to track newtechnologies, investigate and choose the best plan and implementation of these technologies.WLAN is vulnerable to malicious attacks due to their shared medium in unlicensed frequencyspectrum, thus requiring security features for a variety of applications.This paper will discuss some techniques and approaches which can help to detect, localize andidentify wireless network attacks, which present a unique set of challenges to IT and securityprofessionals. All efforts were focusing on the ability to identity based attacks in which amalicious device uses forged MAC addresses to masquerade as a specific client or to createmultiple illegitimate identities. Also, to be sure that the network is able to robustly identify eachtransmitter independently of packet contents, allowing detection of a large class of identity-basedattacks with high probability.The attacker can listen to all wireless traffic, compromise encryption and Use attenuators,amplifiers, directional antennas, software radios, but he cannot be at the location of user or at thelocation of access points. However, we have to choose the best design, implementation, andevaluation techniques in order to secure our network from attackers, where our choice willdepend on a technical implementation to mitigate the risk on the enterprise network infrastructure.

  15. EESA Algorithm in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Pei Zhang

    2014-04-01

    Full Text Available Since there are many problems of traditional extended clustering algorithm in wireless sensor network like short extended time, over energy consumption, too many deviated position the of cluster head nodes and so on, this paper proposes the EESA algorithm. The algorithm makes many improvements on the way of dividing clusters, strategy of electing the cluster head and construction method of data relay path, the two aspects of inter-cluster energy balance and energy balance among the cluster are taken into account at the same time. Detailed simulation results are taken in this thesis to compare network lifetime, average residual energy, energy consumption standard deviation of cluster head node and changes of average remaining energy between the EESA algorithm and ACT algorithm, EECA algorithm and MR-LEACH algorithm; the simulation results show that: the proposed algorithm reduces the load of hot regional cluster head, balances the energy consumption of the entire network nodes and extends the networks lifetime of wireless sensor

  16. Reliable Communication in Wireless Meshed Networks using Network Coding

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Paramanathan, Achuthan; Hundebøll, Martin;

    2012-01-01

    The advantages of network coding have been extensively studied in the field of wireless networks. Integrating network coding with existing IEEE 802.11 MAC layer is a challenging problem. The IEEE 802.11 MAC does not provide any reliability mechanisms for overheard packets. This paper addresses...... this problem and suggests different mechanisms to support reliability as part of the MAC protocol. Analytical expressions to this problem are given to qualify the performance of the modified network coding. These expressions are confirmed by numerical result. While the suggested reliability mechanisms...

  17. Wireless Mesh Software Defined Networks (wmSDN)

    OpenAIRE

    Detti, A.; Pisa, C.; Salsano, S.; Blefari-Melazzi, N.

    2013-01-01

    In this paper we propose to integrate Software Defined Networking (SDN) principles in Wireless Mesh Networks (WMN) formed by OpenFlow switches. The use of a centralized network controller and the ability to setup arbitrary paths for data flows make SDN a handy tool to deploy fine-grained traffic engineering algorithms in WMNs. However, centralized control may be harmful in multi-hop radio networks formed by commodity devices (e.g. Wireless Community Networks), in which node isolation and netw...

  18. An Efficient Management System for Wireless Sensor Networks

    OpenAIRE

    Mei-Yu Lee; Yueh-Min Huang; Yi-Wei Ma; Jiann-Liang Chen

    2010-01-01

    Wireless sensor networks have garnered considerable attention recently. Networks typically have many sensor nodes, and are used in commercial, medical, scientific, and military applications for sensing and monitoring the physical world. Many researchers have attempted to improve wireless sensor network management efficiency. A Simple Network Management Protocol (SNMP)-based sensor network management system was developed that is a convenient and effective way for managers to monitor and contro...

  19. Energy Efficient (EECP) Clustered Protocol for Heterogeneous Wireless Sensor Network

    OpenAIRE

    Kumar, Surender; Prateek, Manish; Bhushan, Bharat

    2014-01-01

    Energy Conservation and prolonging the life of Wireless Sensor Network is one of the major issues in the wireless sensor network as sensor nodes are highly energy constrained devices. Many routing protocols have been proposed for sensor network, especially cluster based routing protocols. Cluster based routing protocols are best known for its energy efficiency, network stability and for increasing the life time of the sensor network. Low Energy Adaptive Clustering Hierarchy (LEACH) is one of ...

  20. Node Heterogeneity for Energy Efficient Synchronization for Wireless Sensor Network

    DEFF Research Database (Denmark)

    Dnyaneshwar, Mantri; Prasad, Neeli R.; Prasad, Ramjee

    2016-01-01

    The energy of the node in the Wireless Sensor Networks (WSNs) is scare and causes the variation in the lifetime of the network. Also, the throughput and delay of the network depend on how long the network sustains i.e. energy consumption. One way to increase the sustainability of network is the i......The energy of the node in the Wireless Sensor Networks (WSNs) is scare and causes the variation in the lifetime of the network. Also, the throughput and delay of the network depend on how long the network sustains i.e. energy consumption. One way to increase the sustainability of network...

  1. New Applications for the Testing and Visualization of Wireless Networks

    Science.gov (United States)

    Griffin, Robert I.; Cauley, Michael A.; Pleva, Michael A.; Seibert, Marc A.; Lopez, Isaac

    2005-01-01

    Traditional techniques for examining wireless networks use physical link characteristics such as Signal-to-Noise (SNR) ratios to assess the performance of wireless networks. Such measurements may not be reliable indicators of available bandwidth. This work describes two new software applications developed at NASA Glenn Research Center for the investigation of wireless networks. GPSIPerf combines measurements of Transmission Control Protocol (TCP) throughput with Global Positioning System (GPS) coordinates to give users a map of wireless bandwidth for outdoor environments where a wireless infrastructure has been deployed. GPSIPerfView combines the data provided by GPSIPerf with high-resolution digital elevation maps (DEM) to help users visualize and assess the impact of elevation features on wireless networks in a given sample area. These applications were used to examine TCP throughput in several wireless network configurations at desert field sites near Hanksville, Utah during May of 2004. Use of GPSIPerf and GPSIPerfView provides a geographically referenced picture of the extent and deterioration of TCP throughput in tested wireless network configurations. GPSIPerf results from field-testing in Utah suggest that it can be useful in assessing other wireless network architectures, and may be useful to future human-robotic exploration missions.

  2. A tutorial survey of topics in wireless networking: Part I

    Indian Academy of Sciences (India)

    Anurag Kumar; D Manjunath

    2007-12-01

    In this two part paper, we provide a survey of recent and emerging topics in wireless networking. We view the area of wireless networking as dealing with problems of resource allocation so that the various connections that utilise the network achieve their desired performance objectives. In the first part of the paper, we first survey the area by providing a taxonomy of wireless networks as they have been deployed. Then, we provide a quick tutorial on the main issues in the wireless ‘physical’ layer, which is concerned with transporting bits over the radio frequency spectrum. Then, we proceed to discuss some resource allocation formulations in CDMA (code division multiple access) cellular networks and OFDMA (orthogonal frequency division multiple access) networks. In the second part of the paper, we first analyse random access wireless networks and pay special attention to 802·11 (Wi-Fi) networks. We then survey some topics in ad hoc multihop wireless networks, where we discuss arbitrary networks, as well as some theory of dense random networks. Finally, we provide an overview of the technical issues in the emerging area of wireless sensor networks.

  3. A tutorial survey of topics in wireless networking: Part II

    Indian Academy of Sciences (India)

    Anurag Kumar; D Manjunath

    2007-12-01

    This is the second part of the survey of recent and emerging topics in wireless networking. We provide an overview of the area of wireless networking as that of dealing with problems of resource allocation so that the various connections that utilise the network achieve their desired performance objectives. In Part I we provided a taxonomy of wireless networks as they have been deployed. We then provided a quick survey of the main issues in the wireless 'physical' layer. We then discussed some resource allocation formulations in CDMA (code division multiple access) cellular networks and OFDMA (orthogonal frequency division multiple access) networks. In this part we begin with a discussion of random access wireless networks. We first provide an overview of the evolution of random access networks from Aloha to the currently popular 802·11 (Wi-Fi) networks. We then analyse the performance of the 802·11 random access protocol. We briefly discuss the problem of optimal association of nodes to Wi-Fi access points. Next, we consider topics in ad hoc multihop wireless networks. We first discuss topology and cross layer control. For the latter, we describe the important maximum weight link scheduling algorithm. The connectivity and capacity of randomly deployed networks are then analysed. Finally, we provide an overview of the technical issues in the emerging area of wireless sensor networks.

  4. Seamless Mobility in Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Faouzi Zarai

    2010-12-01

    Full Text Available In next generation of wireless networks, different technologies belonging to one or more operators should be integrated to form a heterogeneous environment based on an IP core network infrastructure. This ensures user mobility and service continuity by maintaining connections when switching between varioustechnologies and it introduces new resources and possibilities for applications. In this context, an automatic interface selection based on instantaneous and practical constraints and user preferences (Quality of Service (QoS parameters, available resources, security, power consumption, etc is therefore required. The different network selection and handover schemes proposed in the literature can be classified into three approaches according to who is responsible for making the handover decision: the terminal, the network or thanks to a cooperation between both of them. However, these approaches keep presenting some drawbacks; namely the problem of resources management and network load balancing whenever the selection is controlled by the mobile terminal (MT and the problem of scalability and unknown operator’s management policy whenever the selection is rather controlled by the network. In this article, first we propose a new architecture and new network selection scheme that explicitly take into account the current resource usage and the user preferences. Furthermore, our solution ensures the selection of the most suitable network for each flow while taking into consideration its expectations in terms of QoS. A feasibility study of our architecture is then triggered on a single MT by using typical scenarios and using various algorithms to evaluate their performances.

  5. Secure Routing in Wireless Mesh Networks

    CERN Document Server

    Sen, Jaydip

    2011-01-01

    Wireless mesh networks (WMNs) have emerged as a promising concept to meet the challenges in next-generation networks such as providing flexible, adaptive, and reconfigurable architecture while offering cost-effective solutions to the service providers. Unlike traditional Wi-Fi networks, with each access point (AP) connected to the wired network, in WMNs only a subset of the APs are required to be connected to the wired network. The APs that are connected to the wired network are called the Internet gateways (IGWs), while the APs that do not have wired connections are called the mesh routers (MRs). The MRs are connected to the IGWs using multi-hop communication. The IGWs provide access to conventional clients and interconnect ad hoc, sensor, cellular, and other networks to the Internet. However, most of the existing routing protocols for WMNs are extensions of protocols originally designed for mobile ad hoc networks (MANETs) and thus they perform sub-optimally. Moreover, most routing protocols for WMNs are des...

  6. Spectral efficiency enhancement with interference cancellation for wireless relay network

    DEFF Research Database (Denmark)

    Yomo, Hiroyuki; De Carvalho, Elisabeth

    The introduction of relaying into wireless communication system for coverage enhancement can cause severe decrease of spectral efficiency due to the requirement on extra radio resource. In this paper, we propose a method to increase spectral efficiency in such a wireless relay network by employing...... distance of identical radio resource. We analyze a simple scenario with BS, single RS, and 2 MSs, and show that the proposed method has significant potential to enhance spectral efficiency in wireless relay networks....

  7. Security planning for wireless networks : DoD concerns

    OpenAIRE

    Fowler, James D.

    1999-01-01

    Wireless networking is a rapidly emerging technology and security must be addressed as it is incorporated into new and existing local area networks (LANs). It is important to know what unique properties of wireless LANs might amplify existing LAN vulnerabilities or introduce new ones. Wireless transmission techniques, topologies, and vendor offerings were surveyed from a security perspective. Three rating systems were developed to analyze aspects of these survey areas. These areas were then r...

  8. An Anonymous Authentication and Communication Protocol for Wireless Mesh Networks

    OpenAIRE

    Sen, Jaydip

    2011-01-01

    Wireless mesh networks (WMNs) have emerged as a key technology for next generation wireless broadband networks showing rapid progress and inspiring numerous compelling applications. A WMN comprises of a set of mesh routers (MRs) and mesh clients (MCs), where MRs are connected to the Internet backbone through the Internet gateways (IGWs). The MCs are wireless devices and communicate among themselves over possibly multi-hop paths with or without the involvement of MRs. User privacy and security...

  9. Authentication Algorithm for Intrusion Detection in Wireless Networks

    OpenAIRE

    A. K. Santra; Nagarajan S

    2012-01-01

    Security has been a major issue in wireless networks. In a wireless network, wireless devices are prone to be unauthorized accessing data or resources. Hence it becomes necessary to consider issues of security such as : 1. Authentication, 2. Access Control. Traditional methods of Authentication has been to assign user names and passwords. This is extremely vulnerable to be accessed and misused. Therefore, to overcome these problems, This paper proposes a method by which the Username and Passw...

  10. Reconfigurable Antenna Assisted Intrusion Detection in Wireless Networks

    OpenAIRE

    Prathaban Mookiah; Walsh, John M.; Rachel Greenstadt; Dandekar, Kapil R.

    2013-01-01

    Intrusion detection is a challenging problem in wireless networks due to the broadcast nature of the wireless medium. Physical layer information is increasingly used to protect these vulnerable networks. Meanwhile, reconfigurable antennas are gradually finding their way into wireless devices due to their ability to improve data throughput. In this paper, the capabilities of reconfigurable antennas are used to devise an intrusion detection scheme that operates at the physical layer. The detect...

  11. Node clustering for wireless sensor networks

    International Nuclear Information System (INIS)

    Recent years have witnessed considerable growth in the development and deployment of clustering methods which are not only used to maintain network resources but also increases the reliability of the WSNs (Wireless Sensor Network) and the facts manifest by the wide range of clustering solutions. Node clustering by selecting key parameters to tackle the dynamic behaviour of resource constraint WSN is a challenging issue. This paper highlights the recent progress which has been carried out pertaining to the development of clustering solutions for the WSNs. The paper presents classification of node clustering methods and their comparison based on the objectives, clustering criteria and methodology. In addition, the potential open issues which need to be considered for future work are high lighted. Keywords: Clustering, Sensor Network, Static, Dynamic

  12. Fractional Power Control for Decentralized Wireless Networks

    CERN Document Server

    Jindal, Nihar; Andrews, Jeffrey G

    2007-01-01

    We propose and analyze a new paradigm for power control in decentralized wireless networks, termed fractional power control. Transmission power is chosen as the current channel quality raised to an exponent -s, where s is a constant between 0 and 1. Choosing s = 1 and s = 0 correspond to the familiar cases of channel inversion and constant power transmission, respectively. Choosing s in (0, 1) allows all intermediate policies between these two extremes to be evaluated, and we see that neither extreme is ideal. We prove that using an exponent of s = 1/2 optimizes the transmission capacity of an ad hoc network, meaning that the inverse square root of the channel strength is the optimal transmit power scaling. Intuitively, this choice achieves the optimal balance between helping disadvantaged users while making sure they do not flood the network with interference.

  13. Pivot Routing Improves Wireless Sensor Networks Performance

    Directory of Open Access Journals (Sweden)

    Nancy El Rachkidy

    2012-06-01

    Full Text Available Nowadays, wireless sensor networks (WSNs are used in several applications such as environmental monitoring. When network size and data rate increase, congestion becomes as an important issue, especially when an emergency situation generates alarm messages in a specific area of the network. In this paper, we describe the pivot routing protocol named PiRAT, which avoids congested paths by using intermediate pivot nodes. Simulations show that PiRAT has better performance than previous protocols in terms of packet loss, end-to-end delay, congestion and node overload. Moreover, we show that the load-balancing ability of PiRAT allows it to benefit from nodes having independent low duty cycles.

  14. Wireless Secrecy in Large-Scale Networks

    CERN Document Server

    Pinto, Pedro C; Win, Moe Z

    2011-01-01

    The ability to exchange secret information is critical to many commercial, governmental, and military networks. The intrinsically secure communications graph (iS-graph) is a random graph which describes the connections that can be securely established over a large-scale network, by exploiting the physical properties of the wireless medium. This paper provides an overview of the main properties of this new class of random graphs. We first analyze the local properties of the iS-graph, namely the degree distributions and their dependence on fading, target secrecy rate, and eavesdropper collusion. To mitigate the effect of the eavesdroppers, we propose two techniques that improve secure connectivity. Then, we analyze the global properties of the iS-graph, namely percolation on the infinite plane, and full connectivity on a finite region. These results help clarify how the presence of eavesdroppers can compromise secure communication in a large-scale network.

  15. Audio coding in wireless acoustic sensor networks

    DEFF Research Database (Denmark)

    Zahedi, Adel; Østergaard, Jan; Jensen, Søren Holdt;

    2015-01-01

    use of the correlation between the sources available at the nodes, we consider the possibility of combining the measurement and the received messages into one single message at each node instead of forwarding the received messages and separate encoding of the measurement. Moreover, to exploit...... the correlation between the messages received by a node and the node's measurement of the source, we propose to use the measurement as side information and thereby form a distributed source coding (DSC) problem. Assuming that the sources are Gaussian, we then derive the rate-distortion function (RDF......In this paper, we consider the problem of source coding for a wireless acoustic sensor network where each node in the network makes its own noisy measurement of the sound field, and communicates with other nodes in the network by sending and receiving encoded versions of the measurements. To make...

  16. Security Threats in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Giannetsos, Athanasios

    2011-01-01

    . Security and privacy are rapidly replacing performance as the first and foremost concern in many sensor networking scenarios. While security prevention is important, it cannot guarantee that attacks will not be launched and that, once launched, they will not be successful. Therefore, detection of malicious...... intrusions forms an important part of an integrated approach to network security. In this work, we start by considering the problem of cooperative intrusion detection in WSNs and develop a lightweight ID system, called LIDeA, which follows an intelligent agent-based architecture. We show how such a system...... networks are. Motivated by this unexplored security aspect, we investigate a new set of memory related vulnerabilities for sensor embedded devices that, if exploited, can lead to the execution of software-based attacks. We demonstrate how to execute malware on wireless sensor nodes that are based...

  17. NEW CLUSTERING SCHEMES FOR WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    S. M. Mazinani

    2010-05-01

    Full Text Available In this paper, two clustering algorithms are proposed. In the first one, we investigate a clustering protocol for single hop wireless sensor networks that employs a competitive scheme for cluster head selection. The proposed algorithm is named EECS-M that is a modified version to the well known protocol EECS where some of the nodes become volunteers to be cluster heads with an equal probability.  In the competition phase in contrast to EECS using a fixed competition range for any volunteer node, we assign a variable competition range to it that is related to its distance to base station. The volunteer nodes compete in their competition ranges and every one with more residual energy would become cluster head. In the second one, we develop a clustering protocol for single hop wireless sensor networks. In the proposed algorithm some of the nodes become volunteers to be cluster heads. We develop a time based competitive clustering algorithm that the advertising time is based on the volunteer node’s residual energy. We assign to every volunteer node a competition range that may be fixed or variable as a function of distance to BS. The volunteer nodes compete in their competition ranges and every one with more energy would become cluster head. In both proposed algorithms, our objective is to balance the energy consumption of the cluster heads all over the network. Simulation results show the more balanced energy consumption and longer lifetime.

  18. Network Coding for Energy Efficiency in Wireless Body Area Networks

    CERN Document Server

    Shi, Xiaomeng; Lucani, Daniel

    2010-01-01

    A network coding scheme for practical implementations of wireless body area networks is presented, with the objective of providing reliability under low-energy constraints. We propose a simple network layer protocol, study the mean energy to complete in-cast transmissions of given packets from the sensors to the base station (BS), and show through numerical examples that this scheme can reduce the overall energy consumption. More specifically, Time Division Multiple Access (TDMA) is used to allocate the wireless channel to individual nodes. Each node linearly combines its data packets before taking turns to send the ensuing mixtures to the BS. An acknowledgement message is broadcasted by the BS after each round of transmissions, indicating the number of coded packets to be transmitted in the next round. We parametrically study the optimal number of coded packets to send, in terms of completion energy, given the packet erasure probabilities, and the energy use for transmitting data packets as well as listening...

  19. Design of Wireless Video Surveillance Device Based on 3G%基于3G网络的无线视频监控终端设计

    Institute of Scientific and Technical Information of China (English)

    杨春

    2012-01-01

    This terminal is a digital video surveillance system. It includes video or data acquisition, video compression, 3G wireless video transmission, etc. The control terminal is based on TVP5150 and changes the video signals with camera capture analog into digital signal to input to the DSP. By embedding H. 264- into DSP, it compresses the video stream with terminal receives. And it can meet the needs of high precision real-time video surveillance. This terminal integrates 3G and Internet edge, no matter where and when, the customer can quickly access system, remote monitoring and management. The terminal can be started by SMS mode, command machine control, terminal server, timing and alarm triggers. And it can also collect real-time data.%本终端是集视频或数据采集、视频压缩、3G无线视频传输等功能为一体的数字视频监控终端,终端采用TvP=5150视频解码芯片,将摄像机采集的模拟视频信号转换成数字信号输入到DSP中。通过在DSP中植入的H.264算法来压缩终端接收到的视频流,这能够满足高精度实时视频监控的需求。本终端整合了3G网络和Inter—net网络的优势,无论客户身在何处、在何时间,都可以迅速接入系统,随时随地进行远程监控管理。本终端可以通过短信、命令台控制、终端服务器、定时以及报警触发方式启动,同时可以实时采集现场数据。

  20. Noncoherent fusion detection in wireless sensor networks

    OpenAIRE

    Yang, Fucheng

    2013-01-01

    The main motivation of this thesis is to design low-complexity high efficiency noncoherent fusion rules for the parallel triple-layer wireless sensor networks (WSNs) based on frequency-hopping Mary frequency shift keying (FH/MFSK) techniques, which are hence referred to as the FH/MFSK WSNs. The FH/MFSKWSNs may be employed to monitor single or multiple source events (SEs)with each SE having multiple states. In the FH/MFSKWSNs, local decisions made by local sensor nodes (LSNs) are transmitted t...

  1. Power consumption in wireless access networks

    OpenAIRE

    Deruyck, Margot; Vereecken, Willem; Tanghe, Emmeric; Joseph, Wout; Pickavet, Mario; Martens, Luc; Demeester, Piet

    2010-01-01

    The power consumption of wireless access networks will become an important issue in the coming years. In this paper the power consumption of base stations for mobile WiMAX, fixed WiMAX and UMTS is modelled. This power consumption is evaluated in relation to the coverage. For a physical bit rate of 2 Mbps, a power consumption of approximately 5600 W and a range of 1 km is obtained with UMTS. Fixed WiMAX covers 70 % and mobile WiMAX only 40 % of this range. However, fixed and mobile WiMAX consu...

  2. BABY MONITORING SYSTEM USING WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    G. Rajesh

    2014-09-01

    Full Text Available Sudden Infant Death Syndrome (SIDS is marked by the sudden death of an infant during sleep that is not predicted by the medical history and remains unexplained even after thorough forensic autopsy and detailed death investigation. In this we developed a system that provides solutions for the above problems by making the crib smart using the wireless sensor networks (WSN and smart phones. The system provides visual monitoring service through live video, alert services by crib fencing and awakens alert, monitoring services by temperature reading and light intensity reading, vaccine reminder and weight monitoring.

  3. Wireless sensor networks and ecological monitoring

    CERN Document Server

    Jiang, Joe-Air

    2013-01-01

    This book presents the state of the art technologies and solutions to tackle the critical challenges faced by the building and development of the WSN and ecological monitoring system but also potential impact on society at social, medical and technological level. This book is dedicated to Sensing systems for Sensors, Wireless Sensor Networks and Ecological Monitoring. The book aims at Master and PhD degree students, researchers, practitioners, especially WSN engineers involved with ecological monitoring. The book will provide an opportunity of a dedicated and a deep approach in order to improve their knowledge in this specific field.  

  4. NEW CLUSTERING SCHEMES FOR WIRELESS SENSOR NETWORKS

    OpenAIRE

    Mazinani, S. M.; J. Chitizadeh; M. H. Yaghmaee; M. T. Honary; F. Tashtarian

    2010-01-01

    In this paper, two clustering algorithms are proposed. In the first one, we investigate a clustering protocol for single hop wireless sensor networks that employs a competitive scheme for cluster head selection. The proposed algorithm is named EECS-M that is a modified version to the well known protocol EECS where some of the nodes become volunteers to be cluster heads with an equal probability.  In the competition phase in contrast to EECS using a fixed competition range for any volunteer no...

  5. Wireless sensor networks from theory to applications

    CERN Document Server

    El Emary, Ibrahiem M M

    2013-01-01

    Although there are many books available on WSNs, most are low-level, introductory books. The few available for advanced readers fail to convey the breadth of knowledge required for those aiming to develop next-generation solutions for WSNs. Filling this void, Wireless Sensor Networks: From Theory to Applications supplies comprehensive coverage of WSNs. In order to provide the wide-ranging guidance required, the book brings together the contributions of domain experts working in the various subfields of WSNs worldwide. This edited volume examines recent advances in WSN technologies and consider

  6. Analysis on China 3G Development

    Institute of Scientific and Technical Information of China (English)

    Shen Zixin

    2005-01-01

    @@ Foreword: Forecast of 3G and 3G Evolution International Market Size According to UMTS forecast, by 2010, global annual 3G income could reach USD 320 billion, while that from Asia-Pacific region will be around USD 118 billion.China's selection of 3G standards will affect all global wireless equipment suppliers, while how to select TD-SCDMA most crucial.

  7. Coexistence of 3G repeaters with LTE base stations.

    Science.gov (United States)

    Yeo, Woon-Young; Lee, Sang-Min; Hwang, Gyung-Ho; Kim, Jae-Hoon

    2013-01-01

    Repeaters have been an attractive solution for mobile operators to upgrade their wireless networks at low cost and to extend network coverage effectively. Since the first LTE commercial deployment in 2009, many mobile operators have launched LTE networks by upgrading their 3G and legacy networks. Because all 3G frequency bands are shared with the frequency bands for LTE deployment and 3G mobile operators have an enormous number of repeaters, reusing 3G repeaters in LTE networks is definitely a practical and cost-efficient solution. However, 3G repeaters usually do not support spatial multiplexing with multiple antennas, and thus it is difficult to reuse them directly in LTE networks. In order to support spatial multiplexing of LTE, the role of 3G repeaters should be replaced with small LTE base stations or MIMO-capable repeaters. In this paper, a repeater network is proposed to reuse 3G repeaters in LTE deployment while still supporting multilayer transmission of LTE. Interestingly, the proposed network has a higher cluster throughput than an LTE network with MIMO-capable repeaters.

  8. Transmit Power Optimisation in Wireless Network

    Directory of Open Access Journals (Sweden)

    Besnik Terziu

    2011-09-01

    Full Text Available Transmit power optimisation in wireless networks based on beamforming have emerged as a promising technique to enhance the spectrum efficiency of present and future wireless communication systems. The aim of this study is to minimise the access point power consumption in cellular networks while maintaining a targeted quality of service (QoS for the mobile terminals. In this study, the targeted quality of service is delivered to a mobile station by providing a desired level of Signal to Interference and Noise Ratio (SINR. Base-stations are coordinated across multiple cells in a multi-antenna beamforming system. This study focuses on a multi-cell multi-antenna downlink scenario where each mobile user is equipped with a single antenna, but where multiple mobile users may be active simultaneously in each cell and are separated via spatial multiplexing using beamforming. The design criteria is to minimize the total weighted transmitted power across the base-stations subject to SINR constraints at the mobile users. The main contribution of this study is to define an iterative algorithm that is capable of finding the joint optimal beamformers for all basestations, based on a correlation-based channel model, the full-correlation model. Among all correlated channel models, the correlated channel model used in this study is the most accurate, giving the best performance in terms of power consumption. The environment here in this study is chosen to be Non-Light of- Sight (NLOS condition, where a signal from a wireless transmitter passes several obstructions before arriving at a wireless receiver. Moreover there are many scatterers local to the mobile, and multiple reflections can occur among them before energy arrives at the mobile. The proposed algorithm is based on uplink-downlink duality using the Lagrangian duality theory. Time-Division Duplex (TDD is chosen as the platform for this study since it has been adopted to the latest technologies in Fourth

  9. Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding

    OpenAIRE

    Jen-Yeu Chen; Yi-Ying Tseng

    2012-01-01

    Network coding is an elegant technique where, instead of simply relaying the packets of information they receive, the nodes of a network are allowed to combine \\emph{several} packets together for transmission and this technique can be used to achieve the maximum possible information flow in a network and save the needed number of packet transmissions. Moreover, in an energy-constraint wireless network such as Wireless Sensor Network (a typical type of wireless ad hoc network), applying networ...

  10. Wireless multimedia sensor networks on reconfigurable hardware information reduction techniques

    CERN Document Server

    Ang, Li-minn; Chew, Li Wern; Yeong, Lee Seng; Chia, Wai Chong

    2013-01-01

    Traditional wireless sensor networks (WSNs) capture scalar data such as temperature, vibration, pressure, or humidity. Motivated by the success of WSNs and also with the emergence of new technology in the form of low-cost image sensors, researchers have proposed combining image and audio sensors with WSNs to form wireless multimedia sensor networks (WMSNs).

  11. Wireless sensor network for irrigation application in cotton

    Science.gov (United States)

    A wireless sensor network was deployed in a cotton field to monitor soil water status for irrigation. The network included two systems, a Decagon system and a microcontroller-based system. The Decagon system consists of soil volumetric water-content sensors, wireless data loggers, and a central data...

  12. Utilising eduroam[TM] Architecture in Building Wireless Community Networks

    Science.gov (United States)

    Huhtanen, Karri; Vatiainen, Heikki; Keski-Kasari, Sami; Harju, Jarmo

    2008-01-01

    Purpose: eduroam[TM] has already been proved to be a scalable, secure and feasible way for universities and research institutions to connect their wireless networks into a WLAN roaming community, but the advantages of eduroam[TM] have not yet been fully discovered in the wireless community networks aimed at regular consumers. This aim of this…

  13. Wireless Networks : Analysis, Protocols, Architecture and Towards Convergence

    OpenAIRE

    Kumar, P.R.

    2003-01-01

    International audience We present a brief account of some recent work of our group in four areas: i) Information theoretic limits on how much traffic wireless networks can carry. ii) Information theoretically optimal strategies for operating wireless networks. iii) Protocols for media access control, power control, clustering, and routing. iv) The importance of architecture in the oncoming convergence of control with communication and computing.

  14. Artificial intelligence based event detection in wireless sensor networks

    NARCIS (Netherlands)

    Bahrepour, Majid

    2013-01-01

    Wireless sensor networks (WSNs) are composed of large number of small, inexpensive devices, called sensor nodes, which are equipped with sensing, processing, and communication capabilities. While traditional applications of wireless sensor networks focused on periodic monitoring, the focus of more r

  15. Failure impact on coverage in linear wireless sensor networks

    DEFF Research Database (Denmark)

    Mohamed, Nader; Al-Jaroodi, Jameela; Jawhar, Imad;

    2013-01-01

    Wireless Sensor networks (WSN) are used to monitor long linear structures such as pipelines, rivers, railroads, international borders, and high power transmission cables. In this case a special type of WSN called linear wireless sensor network (LSN) is used. One of the main challenges of using LS...

  16. Convergence of wireless, wireline, and photonics next generation networks

    CERN Document Server

    Iniewski, Krzysztof

    2010-01-01

    Filled with illustrations and practical examples from industry, this book provides a brief but comprehensive introduction to the next-generation wireless networks that will soon replace more traditional wired technologies. Written by a mixture of top industrial experts and key academic professors, it is the only book available that covers both wireless networks (such as wireless local area and personal area networks) and optical networks (such as long-haul and metropolitan networks) in one volume. It gives engineers and engineering students the necessary knowledge to meet challenges of next-ge

  17. Intrusion Detection and Security Mechanisms for Wireless Sensor Networks

    OpenAIRE

    Khan, S.; Jaime Lloret; Jonathan Loo

    2014-01-01

    Khan, S.; Lloret, J.; Loo, J. (2014). Intrusion Detection and Security Mechanisms for Wireless Sensor Networks. International Journal of Distributed Sensor Networks. 2014:1-3. doi:10.1155/2014/747483.

  18. 802.11 Wireless Networks The Definitive Guide

    CERN Document Server

    Gast, Matthew S

    2005-01-01

    As we all know by now, wireless networks offer many advantages over fixed (or wired) networks. Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain. The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware avail

  19. Random access MAC protocols and system monitoring methodology in wireless mesh networks.

    OpenAIRE

    Huang, F.

    2008-01-01

    As an extension of wireless Ad Hoc 1 and sensor 2 networks, wireless mesh networks (WMN) 3 have recently been developed as a key solution to provide high-quality multimedia services and applications, such as voice, data and video, over wireless personal area networks (WPAN) 4, wireless local area network (WXAN) 5 and wireless metropolitan area network (WMAN) 6. A WMN usually has a hierarchical network infrastructure with backbone and access networks operated in both Ad Hoc and centralized mod...

  20. A Distributed Geo-Routing Algorithm for Wireless Sensor Networks

    OpenAIRE

    Gyanendra Prasad Joshi; Sung Won Kim

    2009-01-01

    Geographic wireless sensor networks use position information for greedy routing. Greedy routing works well in dense networks, whereas in sparse networks it may fail and require a recovery algorithm. Recovery algorithms help the packet to get out of the communication void. However, these algorithms are generally costly for resource constrained position-based wireless sensor networks (WSNs). In this paper, we propose a void avoidance algorithm (VAA), a novel idea based on upgrading virtual dist...

  1. Association Discovery Protocol for Hybrid Wireless Mesh Networks

    OpenAIRE

    Adjih, Cédric; Cho, Song Yean; Jacquet, Philippe

    2006-01-01

    Wireless mesh networks (WMNs) consist of two kinds of nodes: mesh routers which form the backbones of WMNs and mesh clients which associate with mesh routers to access networks. Because of the discrepancy between mesh routers and mesh clients, WMNs have a hybrid structure. Their hybrid structure presents an opportunity to integrate WMNs with different networks such as wireless LAN, Bluetooth and sensor networks through bridging functions in mesh routers. Because of the ability to integrate va...

  2. Making TCP/IP Viable for Wireless Sensor Networks

    OpenAIRE

    Dunkels, Adam; Alonso, Juan; Voigt, Thiemo

    2003-01-01

    The TCP/IP protocol suite, which has proven itself highly successful in wired networks, is often claimed to be unsuited for wireless micro-sensor networks. In this work, we question this conventional wisdom and present a number of mechanisms that are intended to enable the use of TCP/IP for wireless sensor networks: spatial IP address assignment, shared context header compression, application overlay routing, and distributed TCP caching (DTC). Sensor networks based on TCP...

  3. A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS

    OpenAIRE

    Hossein Jadidoleslamy

    2011-01-01

    Networks protection against different types of attacks is one of most important posed issue into the network andinformation security application domains. This problem on Wireless Sensor Networks (WSNs), in attention to theirspecial properties, has more importance. Now, there are some of proposed architectures and guide lines to protectWireless Sensor Networks (WSNs) against different types of intrusions; but any one of them do not has acomprehensive view to this problem and they are usually d...

  4. COMPARATIVE STUDY OF NEXT GENERATION HIGH SPEED WIRELESS NETWORK

    Directory of Open Access Journals (Sweden)

    RAHUL MALHOTRA

    2011-06-01

    Full Text Available Advances in mobile communication theory have enabled the development of different wireless access technologies. Alongside the revolutionary progress in wireless access technologies, advances in wireless access devices such as laptops, palmtops, and cell phones and mobile middleware have paved the way for the deliveryof beyond-voice-type services while on the move. This sets the platform for high-speed mobile communications that provide high-speed data and both real and non-real time multimedia to mobile users. Today's wireless world uses several communication infrastructures such as Bluetooth for personal area, IEEE 802.11 for local area,Universal Mobile Telecommunication System (UMTS for wide area, and Satellite networks for global networking other hand, since these wireless networks are complementary to each other, their integration and coordinated operation can provide ubiquitous “always best connection" quality mobile communications to the users. This paper discusses the different architectures of wireless networks and the different factors to be considered while designing a hybrid wireless network. The different factors to be considered for design of ahybrid wireless network and the different networks have been explored in this paper.

  5. How to prolong network life-span in wireless networks

    CERN Document Server

    Anderson, Dana

    2011-01-01

    One of the most important problems in wireless sensor network is to develop a routing protocol that has energy efficiency. Since the power of the sensor Nodes are limited, conserving energy and network life is a critical issue in wireless sensor network. Clustering is one of the known methods widely used to face these challenges. In this paper, a cluster based communication protocol with considering the low energy consumption in wireless sensor networks, is introduced which balances the energy load among sensor nodes. The nodes close to each other have more overlap; they sense the same data from environment and cause a waste of energy by generating repetitive data. In this paper, a cluster based routing protocol is introduced, in the proposed protocol, in each round a certain number of nodes are specified; the nodes which have at least one neighboring node at a distance less than the threshold. Then, among them the nodes with less energy and greater overlap with their neighbors have been chosen to go to sleep...

  6. Lifetime maximization routing with network coding in wireless multihop networks

    Institute of Scientific and Technical Information of China (English)

    DING LiangHui; WU Ping; WANG Hao; PAN ZhiWen; YOU XiaoHu

    2013-01-01

    In this paper, we consider the lifetime maximization routing with network coding in wireless mul- tihop networks. We first show that lifetime maximization with network coding is different from pure routing, throughput maximization with network coding and energy minimization with network coding. Then we formulate lifetime maximization problems in three different cases of (i) no network coding, (ii) two-way network coding, and (iii) overhearing network coding. To solve these problems, we use flow augmenting routing (FA) for the first case, and then extend the FA with network coding (FANC) by using energy minimized one-hop network coding. After that, we investigate the influence of parameters of FANC, evaluate the performance of FANC with two-way and overhearing network coding schemes and compare it with that without network coding under two different power control models, namely, protocol and physical ones. The results show that the lifetime can be improved significantly by using network coding, and the performance gain of network coding decreases with the increase of flow asymmetry and the power control ability.

  7. 基于3G 无线传输的测震台站监控设备的研制%The Design and Realization of a Type of Monitoring Equipment for Seismic Stations Based on 3G Wireless Data Transmission

    Institute of Scientific and Technical Information of China (English)

    孙宏志; 王学成; 刘一萌; 卢山; 赵龙梅; 孙恺微

    2014-01-01

    介绍了一种基于3G(第三代移动通信技术)和 SMS(短信业务)的无线数据传输测震台监控仪的工作原理、设计和实现。可实现对相关设备进行断电、上电、重启和备用设备切换等控制;具有通过网口和串口监控数据采集器工作状态的功能;具有通过3G 无线传输测震数据的功能。%Quickly recovering the seismic signals channel or solving problems with seismic station equipment is a major challenge once they are damaged or experience sudden failure.In our study, we designed and constructed wireless data transmitting and monitoring equipment for seismic sta-tions based on the global system for mobile communication(GSM),third generation mobile com-munication technology(3G)and short message service(SMS).This equipment can control(shut down,switch on,restart,and enable the backup device)remote equipment easily,monitor the earthquake data acquisition system (EDAS)by the serial port and network,and transmit the seis-mic data by 3G.The hardware is composed of a core interfacing circuit board and a driving circuit board.The core circuit board includes one LAN port,two COM ports,and a number of I/O inter-faces.The working status of the EDAS at a local seismic station is real-time monitored through the LAN port and COM port.When abnormal data is outputted from the EDAS,the data output stops or is unable to be recognized.Abnormal information of the EDAS is sent to the earthquake monitoring center as short messages,and the center staff is able to make a judgment and take the correct action according to the messages.We designed two CPUs on the core circuit board,one a P89c668 and the other an STC12C5A60S2.The device can make data exchanges with the EDAS-24IP through the LAN chip.Meanwhile,P89c668 can monitor the real-time data flow of the EDAS-24IP,and analyze the correctness of the seismic data flow of the EDAS-24IP as well.In or-der to store parameter data,we used an electrically erasable

  8. The Design and Realization of a Type of Monitoring Equipment for Seismic Stations Based on 3G Wireless Data Transmission%基于3G 无线传输的测震台站监控设备的研制

    Institute of Scientific and Technical Information of China (English)

    孙宏志; 王学成; 刘一萌; 卢山; 赵龙梅; 孙恺微

    2014-01-01

    介绍了一种基于3G(第三代移动通信技术)和 SMS(短信业务)的无线数据传输测震台监控仪的工作原理、设计和实现。可实现对相关设备进行断电、上电、重启和备用设备切换等控制;具有通过网口和串口监控数据采集器工作状态的功能;具有通过3G 无线传输测震数据的功能。%Quickly recovering the seismic signals channel or solving problems with seismic station equipment is a major challenge once they are damaged or experience sudden failure.In our study, we designed and constructed wireless data transmitting and monitoring equipment for seismic sta-tions based on the global system for mobile communication(GSM),third generation mobile com-munication technology(3G)and short message service(SMS).This equipment can control(shut down,switch on,restart,and enable the backup device)remote equipment easily,monitor the earthquake data acquisition system (EDAS)by the serial port and network,and transmit the seis-mic data by 3G.The hardware is composed of a core interfacing circuit board and a driving circuit board.The core circuit board includes one LAN port,two COM ports,and a number of I/O inter-faces.The working status of the EDAS at a local seismic station is real-time monitored through the LAN port and COM port.When abnormal data is outputted from the EDAS,the data output stops or is unable to be recognized.Abnormal information of the EDAS is sent to the earthquake monitoring center as short messages,and the center staff is able to make a judgment and take the correct action according to the messages.We designed two CPUs on the core circuit board,one a P89c668 and the other an STC12C5A60S2.The device can make data exchanges with the EDAS-24IP through the LAN chip.Meanwhile,P89c668 can monitor the real-time data flow of the EDAS-24IP,and analyze the correctness of the seismic data flow of the EDAS-24IP as well.In or-der to store parameter data,we used an electrically erasable

  9. SDN Based User-Centric Framework for Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Zhaoming Lu

    2016-01-01

    Full Text Available Due to the rapid growth of mobile data traffic, more and more basestations and access points (APs have been densely deployed to provide users with ubiquitous network access, which make current wireless network a complex heterogeneous network (HetNet. However, traditional wireless networks are designed with network-centric approaches where different networks have different quality of service (QoS strategies and cannot easily cooperate with each other to serve network users. Massive network infrastructures could not assure users perceived network and service quality, which is an indisputable fact. To address this issue, we design a new framework for heterogeneous wireless networks with the principle of user-centricity, refactoring the network from users’ perspective to suffice their requirements and preferences. Different from network-centric approaches, the proposed framework takes advantage of Software Defined Networking (SDN and virtualization technology, which will bring better perceived services quality for wireless network users. In the proposed user-centric framework, control plane and data plane are decoupled to manage the HetNets in a flexible and coadjutant way, and resource virtualization technology is introduced to abstract physical resources of HetNets into unified virtualized resources. Hence, ubiquitous and undifferentiated network connectivity and QoE (quality of experience driven fine-grained resource management could be achieved for wireless network users.

  10. Energy-efficient multipath routing in wireless sensor network considering wireless interference

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Due to the energy and resource constraints of a wireless sensor node in a wireless sensor network (WSN), design of energy-efficient multipath routing protocols is a crucial concern for WSN applications. To provide high-quality monitoring information, many WSN applications require high-rate data transmission. Multipath routing protocols are often used to increase the network transmission rate and throughput. Although large-scale WSN can be supported by high bandwidth backbone network, the WSN remains the bot...

  11. Self Calibrated Wireless Distributed Environmental Sensory Networks

    Science.gov (United States)

    Fishbain, Barak; Moreno-Centeno, Erick

    2016-04-01

    Recent advances in sensory and communication technologies have made Wireless Distributed Environmental Sensory Networks (WDESN) technically and economically feasible. WDESNs present an unprecedented tool for studying many environmental processes in a new way. However, the WDESNs’ calibration process is a major obstacle in them becoming the common practice. Here, we present a new, robust and efficient method for aggregating measurements acquired by an uncalibrated WDESN, and producing accurate estimates of the observed environmental variable’s true levels rendering the network as self-calibrated. The suggested method presents novelty both in group-decision-making and in environmental sensing as it offers a most valuable tool for distributed environmental monitoring data aggregation. Applying the method on an extensive real-life air-pollution dataset showed markedly more accurate results than the common practice and the state-of-the-art.

  12. Node Clustering for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sania Bhatti

    2012-01-01

    Full Text Available Recent years have witnessed considerable growth in the development and deployment of clustering methods which are not only used to maintain network resources but also increases the reliability of the WSNs (Wireless Sensor Network and the facts manifest by the wide range of clustering solutions. Node clustering by selecting key parameters to tackle the dynamic behaviour of resource constraint WSN is a challenging issue. This paper highlights the recent progress which has been carried out pertaining to the development of clustering solutions for the WSNs. The paper presents classification of node clustering methods and their comparison based on the objectives, clustering criteria and methodology. In addition, the potential open issues which need to be considered for future work are high lighted.

  13. An Algebraic Watchdog for Wireless Network Coding

    CERN Document Server

    Kim, MinJi; Barros, Joao; Koetter, Ralf

    2009-01-01

    In this paper, we propose a scheme, called the algebraic watchdog for wireless network coding, in which nodes can detect malicious behaviors probabilistically, police their downstream neighbors locally using overheard messages, and, thus, provide a secure global self-checking network. Unlike traditional Byzantine detection protocols which are receiver-based, this protocol gives the senders an active role in checking the node downstream. This work is inspired by Marti et al's watchdog-pathrater, which attempts to detect and mitigate the effects of routing misbehavior. We present a graphical model to understand the inference process nodes execute to police their downstream neighbors; as well as to compute, analyze, and approximate the probabilities of misdetection and false detection. In addition, we present an algebraic analysis of the performance using an hypothesis testing framework, that provides exact formulae for probabilities of false detection and misdetection. Detailed description of the graphical mode...

  14. Quality of Service for Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    S. Vivek Saravanan

    2013-11-01

    Full Text Available Wireless Sensor Networks (WSNs are gradually adopted in the industrial world due to their advantages over wired networks. In addition to saving cabling costs, WSNs widen the realm of environments feasible for monitoring. They thus add sensing and acting capabilities to objects in the physical world and allow for communication among these objects or with services in the future Internet. However, the acceptance of WSNs by the industrial automation community is impeded by open issues, such as security guarantees and provision of Quality of Service (QoS. To examine both of these perspectives, we select and survey relevant WSN technologies dedicated to industrial automation. We determine QoS requirements and carry out a threat analysis, which act as basis of our evaluate ion of the cur-rent state-of-the-art. According to the results of this evaluation, we identify and discuss open research issues

  15. RELAY ALGORITHM BASED ON NETWORK CODING IN WIRELESS LOCAL NETWORK

    Institute of Scientific and Technical Information of China (English)

    Wang Qi; Wang Qingshan; Wang Dongxue

    2013-01-01

    The network coding is a new technology in the field of information in 21st century.It could enhance the network throughput and save the energy consumption,and is mainly based on the single transmission rate.However,with the development of wireless network and equipment,wireless local network MAC protocols have already supported the multi-rate transmission.This paper investigates the optimal relay selection problem based on network coding.Firstly,the problem is formulated as an optimization problem.Moreover,a relay algorithm based on network coding is proposed and the transmission time gain of our algorithm over the traditional relay algorithm is analyzed.Lastly,we compare total transmission time and the energy consumption of our proposed algorithm,Network Coding with Relay Assistance (NCRA),Transmission Request (TR),and the Direct Transmission (DT) without relay algorithm by adopting IEEE 802.11b.The simulation results demonstrate that our algorithm that improves the coding opportunity by the cooperation of the relay nodes leads to the transmission time decrease of up to 17% over the traditional relay algorithms.

  16. An Efficient ECDSA-Based Signature Scheme for Wireless Networks

    Institute of Scientific and Technical Information of China (English)

    XU Zhong; DAI Guanzhong; YANG Deming

    2006-01-01

    Wired equivalent security is difficult to provide in wireless networks due to high dynamics, wireless link vulnerability, and decentralization. The Elliptic Curve Digital Signature Algorithm(ECDSA) has been applied to wireless networks because of its low computational cost and short key size, which reduces the overheads in a wireless environment. This study improves the ECDSA scheme by reducing its time complexity. The significant advantage of the algorithm is that our new scheme needs not to calculate modular inverse operation in the phases of signature generation and signature verification. Such an improvement makes the proposed scheme more efficient and secure.

  17. A Formal Evaluation of the Security Schemes for Wireless Networks

    Directory of Open Access Journals (Sweden)

    Shadi R. Masadeh

    2011-09-01

    Full Text Available Information security is a critical issue in the wireless network, because the transmission media is open (no physical control on the air. Any wireless device equipped with wireless interface can use and share the airwave transmission medium with other users. For protection purposes, several security mechanisms have been developed over years. This paper provides systematic evaluation of different security schemes used in wireless networks: WEP, TKIP, WPA, AES and WPA2. A formal comparison is made between these security algorithms for different settings such as different data types, different packet sizes and traffic loads.

  18. Existing PON Infrastructure Supported Hybrid Fiber-Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yu, Xianbin; Zhao, Ying; Deng, Lei;

    2012-01-01

    We propose a hybrid fiber wireless sensor network based on the existing PON infrastructure. The feasibility of remote sensing and PON convergence is experimentally proven by transmitting direct-sequence spread-spectrum wireless sensing and 2.5Gbps GPON signals.......We propose a hybrid fiber wireless sensor network based on the existing PON infrastructure. The feasibility of remote sensing and PON convergence is experimentally proven by transmitting direct-sequence spread-spectrum wireless sensing and 2.5Gbps GPON signals....

  19. LOCATION DISCOVERY WITH SECURITY IN WIRELESS SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    Mahadevi G

    2011-04-01

    Full Text Available Localization is one of the supporting technologies in wireless sensor networks. To identify the exact location of each and every sensor may not be feasible. In most of the sensor network application gathered by sensor will be meaningless without the location of sensor nodes. The researchers involve identifying localization of sensor node for the past years. The localization places a vital role in wireless sensor network. Exchange information with the environment through sensor and implement the function of collecting and delaying with data. Various techniques are available to locate the sensor node from the network. As sensor node is tiny device, it is not easy to develop an application for wireless sensor network security. In this paper we describe the different type of approaches of node localization discovery in wireless sensor networks and we describe the architecture of elliptic curve cryptography processor for network security.

  20. Fundamental Properties of Wireless Mobile Ad-hoc Networks

    NARCIS (Netherlands)

    Hekmat, R.

    2005-01-01

    Wireless mobile ad-hoc networks are formed by mobile devices that set up a possibly short-lived network for communication needs of the moment. Ad-hoc networks are decentralized, self-organizing networks capable of forming a communication network without relying on any fixed infrastructure. Each nod

  1. One Kind of Routing Algorithm Modified in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Wei Ni Ni

    2016-01-01

    Full Text Available The wireless sensor networks are the emerging next generation sensor networks, Routing technology is the wireless sensor network communication layer of the core technology. To build reliable paths in wireless sensor networks, we can consider two ways: providing multiple paths utilizing the redundancy to assure the communication reliability or constructing transmission reliability mechanism to assure the reliability of every hop. Braid multipath algorithm and ReInforM routing algorithm are the realizations of these two mechanisms. After the analysis of these two algorithms, this paper proposes a ReInforM routing algorithm based braid multipath routing algorithm.

  2. Guest Editorial: Special Issue on Wireless Mobile Computing and Networking

    Institute of Scientific and Technical Information of China (English)

    Yu Wang; Yanwei Wu; Fan Li; Bin Xu; Teresa Dahlberg

    2011-01-01

    Recent convergence of information communications technology and computing is creating new demands and opportunities for ubiquitous computing via wireless and mobile equipments.The demanding networking environment of wireless communications and the fast-growing number of mobile users impose several challenges in terms of channel estimation,network protocol design,resource management,systematic design,application development,and security.The objective of this special issue is to gather recent advances addressing networks,systems,algorithms,and applications that support the symbiosis of mobile computers and wireless networks.

  3. Mobility Models for Next Generation Wireless Networks Ad Hoc, Vehicular and Mesh Networks

    CERN Document Server

    Santi, Paolo

    2012-01-01

    Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also: Provides up-to-date coverage of mobility models for next generation wireless networksOffers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and

  4. FRAMEWORK FOR WIRELESS NETWORK SECURITY USING QUANTUM CRYPTOGRAPHY

    Directory of Open Access Journals (Sweden)

    Priyanka Bhatia

    2014-12-01

    Full Text Available Data that is transient over an unsecured wireless network is always susceptible to being intercepted by anyone within the range of the wireless signal. Hence providing secure communication to keep the user’s information and devices safe when connected wirelessly has become one of the major concerns. Quantum cryptography provides a solution towards absolute communication security over the network by encoding information as polarized photons, which can be sent through the air. This paper explores on the aspect of application of quantum cryptography in wireless networks. In this paper we present a methodology for integrating quantum cryptography and security of IEEE 802.11 wireless networks in terms of distribution of the encryption keys

  5. Throughput Maximization for Wireless Multimedia Sensor Networks in Industrial Applications

    Directory of Open Access Journals (Sweden)

    M.Markco

    2014-06-01

    Full Text Available n recent years, there has been growing interests in wireless sensor networks. Wireless sensor network is an autonomous system of sensor connected by wireless devices without any fixed infrastructure support. To meet the challenge paradigms of wireless sensor networks like Energy efficiency, Delay constraints, Reliability and adaptive mechanis m the sensor nodes are enhanced with multimedia support. The Wireless multimedia sensor nodes (WMSN enable to streamline the data that will control and monitor the industrial activities within the sensing area. The adaptive sleepless protocol will address the following issues: First, this protocol mainly designed for desired packet delivery and delay probabilities while reducing the energy consumption of the network. Second, this protocol is based on demand based dynamic sleep scheduling scheme for data communication. In this packets are transmitted through the cross layer interaction. In this cross layer interaction enables to reach a maximum efficiency.

  6. Association Analaysis in Wireless Network using Trace data

    Directory of Open Access Journals (Sweden)

    L.Velmurugan,

    2010-12-01

    Full Text Available With the explosive growth in wireless devices like smart phones, PDA’s, netbooks, WLAN networks are usually overloaded at workplaces, social and home environments. Though a large number of mobility models have been proposed, a better way is to study wireless mobility traces which gives more accurate movement information for a population. An accurate location predictor can significantly improve the performance or reliability of wireless network protocols and the wireless network infrastructure itself. These improvements lead to a better user experience to a more cost-effective infrastructure or both. In this work, it is proposed to study mobility traces and generate rules for mobility of users which was previously unknown in campus wide wireless network. We also study analyze and show that atcertain locations access points are very rarely used.

  7. A Graph Theoretical Approach for Network Coding in Wireless Body Area Networks

    CERN Document Server

    Byrne, Eimear; Marinkovic, Stevan; Popovici, Emanuel

    2011-01-01

    Modern medical wireless systems, such as wireless body area networks (WBANs), are applications of wireless networks that can be used as a tool of data transmission between patients and doctors. Accuracy of data transmission is an important requirement for such systems. In this paper, we will propose a WBAN which is robust against erasures and describe its properties using graph theoretic techniques.

  8. Distributed Cooperative Caching In Social Wireless Network

    Directory of Open Access Journals (Sweden)

    Dimple Pandya

    2014-04-01

    Full Text Available This paper introduces cooperative caching techniques for reducing electronic content provisioning cost in Social Wireless Networks (SWNET.SWNETs are formed by mobile devices, such as modern cell phones etc. sharing common takings in electronic content, and actually meeting together in public places. Electronic object caching in such SWNETs are shown to be able to reduce the content provisioning cost which depends heavily on the service and pricing dependences among various stakeholders including content providers (CP, network service providers, and End Consumers (EC.This paper develops practical network, service, and pricing models which are then used for creating two object caching strategies for reducing content provisioning costs in networks with homogenous and heterogeneous object demands. The paper develops analytical and simulation designs for analysing the proposed caching strategies in the presence of selfish users that deviate from network-wide cost-optimal policies. It also reports results from an Android phone based prototype SWNET, validating the presented analytical and simulation results.

  9. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  10. Intelligent Mobility Management Model for Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Sanjeev Prakash

    2015-12-01

    Full Text Available Growing consumer demands for access of communication services in a ubiquitous environment is a driving force behind the development of new technologies. The rapid development in communication technology permits the end users to access heterogeneous wireless networks to utilize the swerve range of data rate service “anywhere any time”. These forces to technology developers to integrate different wireless access technologies which is known as fourth generation (4G. It is become possible to reduce the size of mobile nodes (MNs with manifold network interfaces and development in IP-based applications. 4G mobile/wireless computing and communication heterogeneous environment consist of various access technologies that differ in bandwidth, network conditions, service type, latency and cost. A major challenge of the 4G wireless network is seamless vertical handoff across the heterogeneous wireless access network as the users are roaming in the heterogeneous wireless network environment. Today communication devices are portable and equipped with manifold interfaces and are capable to roam seamlessly among the various access technology networks for maintaining the network connectivity, since no single-interface technology provides ubiquitous coverage and quality-of-service (QoS. This paper reports a mobile agent based heterogeneous wireless network management system. In this system agent’s decision focuses on multi parameter system (MPS. This system works on the parameters- network delay, received signal strength, network latency and study of the collected information about adjoining network cells viz., accessible channel. System is simulated and a comparative study is also made. From results it is observed that system improves the performance of wireless network.

  11. ON THE CAPACITY REGION OF WIRELESS AD HOC RELAY NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Dai Qinyun; Yao Wangsheng; Peng Jianmin; Su Gang

    2006-01-01

    Network capacity is a key characteristic to evaluate the performance of wireless networks. The goal of this paper is to study the capacity of wireless ad hoc relay network. In the model, there is at most ns source nodes transmitting signal simultaneously in the network and the arbitrarily complex network coding is allowed. The upper capacity bound of the network model are derived from the max-flow min-cut theorem and the lower capacity bound are obtained by the rate-distortion function for the Gaussian source. Finally, simulation results show that the upper network capacity will decrease as the number of source nodes is increased.

  12. Handbook of sensor networks compact wireless and wired sensing systems

    CERN Document Server

    Ilyas, Mohammad

    2004-01-01

    INTRODUCTION Opportunities and Challenges in Wireless Sensor Networks, M. Haenggi, Next Generation Technologies to Enable Sensor Networks, J. I.  Goodman, A. I. Reuther, and D. R. Martinez Sensor Networks Management, L. B. Ruiz, J. M. Nogueira, and A. A. F. Loureiro Models for Programmability in Sensor Networks, A. Boulis Miniaturizing Sensor Networks with MEMS, Brett Warneke A Taxonomy of Routing Techniques in Wireless Sensor Networks, J. N. Al-Karaki and A. E. Kamal Artificial Perceptual Systems, A. Loutfi, M. Lindquist, and P. Wide APPLICATIONS Sensor Network Architecture and Appl

  13. Energy management in wireless cellular and ad-hoc networks

    CERN Document Server

    Imran, Muhammad; Qaraqe, Khalid; Alouini, Mohamed-Slim; Vasilakos, Athanasios

    2016-01-01

    This book investigates energy management approaches for energy efficient or energy-centric system design and architecture and presents end-to-end energy management in the recent heterogeneous-type wireless network medium. It also considers energy management in wireless sensor and mesh networks by exploiting energy efficient transmission techniques and protocols. and explores energy management in emerging applications, services and engineering to be facilitated with 5G networks such as WBANs, VANETS and Cognitive networks. A special focus of the book is on the examination of the energy management practices in emerging wireless cellular and ad hoc networks. Considering the broad scope of energy management in wireless cellular and ad hoc networks, this book is organized into six sections covering range of Energy efficient systems and architectures; Energy efficient transmission and techniques; Energy efficient applications and services. .

  14. Challenges: From Standards to Implementation for Industrial Wireless Sensor Networks

    OpenAIRE

    Jian Ma; Hongchao Wang; Dong Yang; Yujun Cheng

    2016-01-01

    Despite the fact that a number of research efforts in the area of Industrial Wireless Sensor Networks (IWSNs) exist, there is a lack of really practical IWSN implementations, deployments, and in-field applications. This paper presents the design and implementation of an IWSN for welder machine systems, called WirelessCAN which is based on WirelessHART to replace wired CAN fieldbus. Although the implementation and challenges are application-specific, we believe that the problems we encountered...

  15. Frequency hopping CDMA for flexible third generation wireless networks

    OpenAIRE

    Fitton, MP; Nix, AR; Beach, MA

    1997-01-01

    Frequency hopping spread spectrum (FH-SS) has found a number of applications in cellular systems, wireless local loop, and wireless local area networks. The suitability of slow frequency hopping code division multiple access (SFH-CDMA) is characterised, for application in third generation wireless communications. An FH architecture displays inherent frequency diversity, and consequently is resilient to the effects of intersymbol interference arising from significant time dispersion in the cha...

  16. Secure Roaming and Handover Procedures in Wireless Access Networks

    OpenAIRE

    Meyer, Ulrike

    2006-01-01

    A growing number of wireless technologies and providers, as well as users' increasing need and desire to be connected and reachable at all times, call for solutions that enable interoperation between providers and technologies. Roaming procedures enable wireless access in areas that are covered by network providers with which the user does not have any prior arrangements. Handover procedures enable the maintenance of ongoing connections while a user moves across different wireless access netw...

  17. Using software-defined networking principles for wireless sensor networks

    OpenAIRE

    Jacobsson, Martin; Orfanidis, Charalampos

    2015-01-01

    In this paper, we propose an architecture based on software-defined networking (SDN) for wireless sensor networks. Ideas of how to design and make use of the flexibility that SDN offers are presented. We discuss how SDN principles can lead to the use of commodity hardware in a wider range of WSN deployments and then tailor the software only to meet the requirements of the specific deployments and their applications. A few examples are introduced that demonstrate how the architecture can be us...

  18. A Multievent Congestion Control Protocol for Wireless Sensor Networks

    OpenAIRE

    Shah GhalibA; Hussain FaisalB; Cebi Yalcin

    2008-01-01

    Abstract Wireless sensor networks are application-dependent networks. An application may require general event region information, per-node event region information, or prioritized event information in case of multiple events. All event flows are subject to congestion in wireless sensor networks. This is due to the sudden impulse of information flow from a number of event nodes to a single destination. Congestion degrades system throughput and results in energy loss of nodes. In this paper, w...

  19. Routing Protocol for Anycast Communications in a Wireless Sensor Network

    OpenAIRE

    Rachkidy, Nancy; Guitton, Alexandre; Misson, Michel

    2010-01-01

    International audience In wireless sensor networks, there is usually a sink which gathers data from the battery-powered sensor nodes. As sensor nodes around the sink consume their energy faster than the other nodes, several sinks have to be deployed to increase the network lifetime. In this paper, we motivate the need of anycast communications in wireless networks, where all the sinks are identical and can gather data from any source. To reduce interference and congestion areas on the wire...

  20. Coded Cooperation for Multiway Relaying in Wireless Sensor Networks

    OpenAIRE

    Zhongwei Si; Junyang Ma; Ragnar Thobaben

    2015-01-01

    Wireless sensor networks have been considered as an enabling technology for constructing smart cities. One important feature of wireless sensor networks is that the sensor nodes collaborate in some manner for communications. In this manuscript, we focus on the model of multiway relaying with full data exchange where each user wants to transmit and receive data to and from all other users in the network. We derive the capacity region for this specific model and propose a coding strategy throug...

  1. An energy efficient clustering routing algorithm for wireless sensor networks

    Institute of Scientific and Technical Information of China (English)

    LI Li; DONG Shu-song; WEN Xiang-ming

    2006-01-01

    This article proposes an energy efficient clustering routing (EECR) algorithm for wireless sensor network. The algorithm can divide a sensor network into a few clusters and select a cluster head base on weight value that leads to more uniform energy dissipation evenly among all sensor nodes.Simulations and results show that the algorithm can save overall energy consumption and extend the lifetime of the wireless sensor network.

  2. A survey on the wireless sensor network technology

    International Nuclear Information System (INIS)

    Wireless sensor technology is required in the safety inspection for safety-critical unit of nuclear power plant. This report describes wireless sensor technology related with the project named 'Development of a remote care system of NPP components based on the network and safety database'. This report includes contents of methodology and status of sensor network construction, status of zigbee sensor network, problem of security and sensor battery. Energy harvesting technology will be mentioned on the next report

  3. An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks

    OpenAIRE

    Sen, Jaydip

    2010-01-01

    Intrusion detection in wireless ad hoc networks is a challenging task because these networks change their topologies dynamically, lack concentration points where aggregated traffic can be analyzed, utilize infrastructure protocols that are susceptible to manipulation, and rely on noisy, intermittent wireless communications. Security remains a major challenge for these networks due their features of open medium, dynamically changing topologies, reliance on co-operative algorithms, absence of c...

  4. Wireless Multimedia Sensor Networks: Current Trends and Future Directions

    OpenAIRE

    Julian Morillo-Pozo; Manel Guerrero Zapata; Jamal N. Al-Karaki; Almalkawi, Islam T.

    2010-01-01

    Wireless Multimedia Sensor Networks (WMSNs) have emerged and shifted the focus from the typical scalar wireless sensor networks to networks with multimedia devices that are capable to retrieve video, audio, images, as well as scalar sensor data. WMSNs are able to deliver multimedia content due to the availability of inexpensive CMOS cameras and microphones coupled with the significant progress in distributed signal processing and multimedia source coding techniques. In this paper, we outline ...

  5. Control of Wireless Networks with Secrecy

    CERN Document Server

    Koksal, C Emre; Sarikaya, Yunus

    2011-01-01

    We consider the problem of cross-layer resource allocation in time-varying cellular wireless networks, and incorporate information theoretic secrecy as a Quality of Service constraint. Specifically, each node in the network injects two types of traffic, private and open, at rates chosen in order to maximize a global utility function, subject to network stability and secrecy constraints. The secrecy constraint enforces an arbitrarily low mutual information leakage from the source to every node in the network, except for the sink node. We first obtain the achievable rate region for the problem for single and multi-user systems assuming that the nodes have full CSI of their neighbors. Then, we provide a joint flow control, scheduling and private encoding scheme, which does not rely on the knowledge of the prior distribution of the gain of any channel. We prove that our scheme achieves a utility, arbitrarily close to the maximum achievable utility. Numerical experiments are performed to verify the analytical resu...

  6. On optimizing low SNR wireless networks using network coding

    CERN Document Server

    Thakur, Mohit

    2010-01-01

    The rate optimization for wireless networks with low SNR is investigated. While the capacity in the limit of disappearing SNR is known to be linear for fading and non-fading channels, we study the problem of operating in low SNR wireless network with given node locations that use network coding over flows. The model we develop for low SNR Gaussian broadcast channel and multiple access channel respectively operates in a non-trivial feasible rate region. We show that the problem reduces to the optimization of total network power which can be casted as standard linear multi-commodity min-cost flow program with no inherent combinatorially difficult structure when network coding is used with non integer constraints (which is a reasonable assumption). This is essentially due to the linearity of the capacity with respect to vanishing SNR which helps avoid the effect of interference for the degraded broadcast channel and multiple access environment in consideration, respectively. We propose a fully decentralized Prim...

  7. Cross Layer Protocols For Multimedia Transmission In Wireless Networks

    Directory of Open Access Journals (Sweden)

    Santhosha Rao

    2012-07-01

    Full Text Available Wireless networks initially inherited the traditional layered architecture from wired networks. Nevertheless, as third and fourth generation wireless communications and networking begin to proliferate in the area of communication networks, the suitability of the layered architecture is coming under close scrutiny from the research community. It is repeatedly argued that although layered architectures have served well for wired networks, they might not be suitable for wireless networks [1]. One of the key challenges for next-generation broadband wireless networks is to devise end-to-end protocol solutions across wired and wireless networks to accommodate large densities of highly mobile users demanding services and applications with a wide range of Quality of Service (QoS requirements. Hence, in order to meet the challenging demands on future wireless networks, it may be required to adopt new approaches in which protocols can be designed by violating the reference layered architecture allowing direct communication between protocols in nonadjacent layers Such violations of a layered architecture have been termed as cross-layer design(CLD.

  8. A Survey on Energy Efficiency for Wireless Mesh Network

    Directory of Open Access Journals (Sweden)

    Sarra Mamechaoui

    2013-04-01

    Full Text Available Reduction of CO2 emissions is a major global environmental issue. Over the past few years, wireless andmobile communications are becoming increasingly popular with consumers. The Most popular kind ofwireless access is known as Wireless Mesh Networks (WMNs that provide wireless connectivity throughlot cheaper and more supple backhaul infrastructure relative to wired solutions. Wireless Mesh Network(WMN is a new emerging technology which has been adopted as the wireless internetworking solution forthe near future. Due to higher energy consumption in the information and communication technology (ICTindustries, and which would have an impact on the environment, energy efficiency has become a key factorto evaluate the performance of a communication network.This paper primarily focuses on the classification layer the greatest existing approaches devoted to theconservation of energy. It is also discussing the most interesting works on energy saving in WMNsnetworks.

  9. 2014 International Conference on Wireless Communications, Networking and Applications

    CERN Document Server

    2016-01-01

    This book is based on a series of conferences on Wireless Communications, Networking and Applications that have been held on December 27-28, 2014 in Shenzhen, China. The meetings themselves were a response to technological developments in the areas of wireless communications, networking and applications and facilitate researchers, engineers and students to share the latest research results and the advanced research methods of the field. The broad variety of disciplines involved in this research and the differences in approaching the basic problems are probably typical of a developing field of interdisciplinary research. However, some main areas of research and development in the emerging areas of wireless communication technology can now be identified. The contributions to this book are mainly selected from the papers of the conference on wireless communications, networking and applications and reflect the main areas of interest: Section 1 - Emerging Topics in Wireless and Mobile Computing and Communications...

  10. Development of a Testbed for Wireless Underground Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mehmet C. Vuran

    2010-01-01

    Full Text Available Wireless Underground Sensor Networks (WUSNs constitute one of the promising application areas of the recently developed wireless sensor networking techniques. WUSN is a specialized kind of Wireless Sensor Network (WSN that mainly focuses on the use of sensors that communicate through soil. Recent models for the wireless underground communication channel are proposed but few field experiments were realized to verify the accuracy of the models. The realization of field WUSN experiments proved to be extremely complex and time-consuming in comparison with the traditional wireless environment. To the best of our knowledge, this is the first work that proposes guidelines for the development of an outdoor WUSN testbed with the goals of improving the accuracy and reducing of time for WUSN experiments. Although the work mainly aims WUSNs, many of the presented practices can also be applied to generic WSN testbeds.

  11. Security Analysis of Routing Protocols in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mohammad Sadeghi

    2012-01-01

    Full Text Available In this paper, I describe briefly some of the different types of attacks on wireless sensor networks such as Sybil, HELLO, Wormhole and Sinkhole attacks. Then I describe security analysis of some major routing protocols in wireless sensor network such as Directed Diffusion, TinyOS beaconing, geographic and Rumor routings in term of attacks and security goals. As a result I explain some secure routing protocols for wireless sensor network and is discussed briefly some methods and policy of these protocols to meet their security requirements. At last some simulation results of these protocols that have been done by their designer are mentioned.

  12. Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks

    Directory of Open Access Journals (Sweden)

    Rafe Alasem

    2010-05-01

    Full Text Available Heterogeneous Wireless Networks are considered nowadays as one of the potential areas in research and development. The traffic management’s schemes that have been used at the fusion points between the different wireless networks are classical and conventional. This paper is focused on developing a novel scheme to overcome the problem of traffic congestion in the fusion point router interconnected the heterogeneous wireless networks. The paper proposed an EF-AQM algorithm which provides an efficient and fair allocation of bandwidth among different established flows. Finally, the proposed scheme developed, tested and validated through a set of experiments to demonstrate the relative merits and capabilities of a proposed scheme

  13. Wireless network traffic modeling based on extreme value theory

    Science.gov (United States)

    Liu, Chunfeng; Shu, Yantai; Yang, Oliver W. W.; Liu, Jiakun; Dong, Linfang

    2006-10-01

    In this paper, Extreme Value Theory (EVT) is presented to analyze wireless network traffic. The role of EVT is to allow the development of procedures that are scientifically and statistically rational to estimate the extreme behavior of random processes. There are two primary methods for studying extremes: the Block Maximum (BM) method and the Points Over Threshold (POT) method. By taking limited traffic data that is greater than the threshold value, our experiment and analysis show the wireless network traffic model obtained with the EVT fits well with that of empirical distribution of traffic, thus illustrating that EVT has a good application foreground in the analysis of wireless network traffic.

  14. Performance of the hybrid wireless mesh protocol for wireless mesh networks

    DEFF Research Database (Denmark)

    Boye, Magnus; Staalhagen, Lars

    2010-01-01

    Wireless mesh networks offer a new way of providing end-user access and deploying network infrastructure. Though mesh networks offer a price competitive solution to wired networks, they also come with a set of new challenges such as optimal path selection, channel utilization, and load balancing....... These challenges must first be overcome before satisfactory network stability and throughput can be achieved. This paper studies the performance of the Hybrid Wireless Mesh Protocol, the proposed routing protocol for the upcoming IEEE 802.11s standard. HWMP supports two modes of path selection: reactive...

  15. Component Based Clustering in Wireless Sensor Networks

    CERN Document Server

    Amaxilatis, Dimitrios; Koninis, Christos; Pyrgelis, Apostolos

    2011-01-01

    Clustering is an important research topic for wireless sensor networks (WSNs). A large variety of approaches has been presented focusing on different performance metrics. Even though all of them have many practical applications, an extremely limited number of software implementations is available to the research community. Furthermore, these very few techniques are implemented for specific WSN systems or are integrated in complex applications. Thus it is very difficult to comparatively study their performance and almost impossible to reuse them in future applications under a different scope. In this work we study a large body of well established algorithms. We identify their main building blocks and propose a component-based architecture for developing clustering algorithms that (a) promotes exchangeability of algorithms thus enabling the fast prototyping of new approaches, (b) allows cross-layer implementations to realize complex applications, (c) offers a common platform to comparatively study the performan...

  16. Cooperative Beamforming for Wireless Ad Hoc Networks

    CERN Document Server

    Dong, Lun; Poor, H Vincent

    2007-01-01

    Via collaborative beamforming, nodes in a wireless network are able to transmit a common message over long distances in an energy efficient fashion. However, the process of making available the same message to all collaborating nodes introduces delays. In this paper, a MAC-PHY cross-layer scheme is proposed that enables collaborative beamforming at significantly reduced collaboration overhead. It consists of two phases. In the first phase, nodes transmit locally in a random access time-slotted fashion. Simultaneous transmissions from multiple source nodes are viewed as linear mixtures of all transmitted packets. In the second phase, a set of collaborating nodes, acting as a distributed antenna system, beamform the received analog waveform to one or more faraway destinations. This step requires multiplication of the received analog waveform by a complex weight, which is independently computed by each cooperating node, and which allows packets bound to the same destination to add coherently at the destination n...

  17. A cross-layer optimization algorithm for wireless sensor network

    Science.gov (United States)

    Wang, Yan; Liu, Le Qing

    2010-07-01

    Energy is critical for typical wireless sensor networks (WSN) and how to energy consumption and maximize network lifetime are big challenges for Wireless sensor networks; cross layer algorithm is main method to solve this problem. In this paper, firstly, we analyze current layer-based optimal methods in wireless sensor network and summarize the physical, link and routing optimization techniques. Secondly we compare some strategies in cross-layer optimization algorithms. According to the analysis and summary of the current lifetime algorithms in wireless sensor network A cross layer optimization algorithm is proposed,. Then this optimization algorithm proposed in the paper is adopted to improve the traditional Leach routing protocol. Simulation results show that this algorithm is an excellent cross layer algorithm for reducing energy consumption.

  18. Study on Sinkhole Attacks in Wireless Ad hoc Networks

    Directory of Open Access Journals (Sweden)

    GAGANDEEP

    2012-06-01

    Full Text Available Wireless ad hoc network is a collection of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network topologies. As compared to conventional network, wireless ad hocnetwork are more vulnerable to the security attacks. The nature and structure of wireless ad hoc network makes it very attractive to attackers, because there is no fixed infrastructure and administrativeapproach in it. “Sinkhole attack” is one of the severe attacks in this type of network; this makes trustable nodes to malicious nodes that result in loss of secure information. This paper focuses on sinkhole attacks on routing protocols such as DSR, AODV. To overcome the problems occur due to sinkhole we discuss about Security-aware routing (SAR which helps to reduce the impact of such attack.

  19. INSTRUMENTATION AND CONTROL FOR WIRELESS SENSOR NETWORK FOR AUTOMATED IRRIGATION

    Science.gov (United States)

    An in-field sensor-based irrigation system is of benefit to producers in efficient water management. A distributed wireless sensor network eliminates difficulties to wire sensor stations across the field and reduces maintenance cost. Implementing wireless sensor-based irrigation system is challengin...

  20. Network Coding Opportunities for Wireless Grids Formed by Mobile Devices

    DEFF Research Database (Denmark)

    Nielsen, Karsten Fyhn; Madsen, Tatiana Kozlova; Fitzek, Frank

    2008-01-01

    Wireless grids have potential in sharing communication, computational and storage resources making these networks more powerful, more robust, and less cost intensive. However, to enjoy the benefits of cooperative resource sharing, a number of issues should be addressed and the cost of the wireless...

  1. Collaborative wireless sensor networks in industrial and business processes

    NARCIS (Netherlands)

    Marin-Perianu, Mihai

    2008-01-01

    Wireless Sensor Networks (WSNs) create the technological basis for building pervasive, large-scale distributed systems, which can sense their environment in great detail, communicate the relevant information via the wireless medium, reason collectively upon the observed situation and react according

  2. A Wireless Sensor Network For Soil Monitoring

    Science.gov (United States)

    Szlavecz, K.; Cogan, J.; Musaloiu-Elefteri, R.; Small, S.; Terzis, A.; Szalay, A.

    2005-12-01

    The most spatially complex stratum of a terrestrial ecosystem is its soil. Among the major challenges of studying the soil ecosystem are the diversity and the cryptic nature of biota, and the enormous heterogeneity of the soil substrate. Often this patchiness drives spatial distribution of soil organisms, yet our knowledge on the spatio-temporal patterns of soil conditions is limited. To monitor the environmental conditions at biologically meaningful spatial scales we have developed and deployed a wireless sensor network of thirty nodes. Each node is based on a MICAz mote connected to a custom-built sensor suite that includes a Watermark soil moisture sensor, an Irrometer soil temperature sensor, and sensors capable of recording ambient temperature and light intensity. To assess CO2 production at the ground level a subset of the nodes is equipped with Telaire 6004 CO2 sensor. We developed the software running on the motes from scratch, using the TinyOS development environment. Each mote collects measurements every minute, and stores them persistently in a non-volatile memory. The decision to store data locally at each node enables us to reliably retrieve the data in the face of network losses and premature node failures due to power depletion. Collected measurements are retrieved over the wireless network through a PC-class computer acting as a gateway between the sensor network and the Internet. Considering that motes are battery powered, the largest obstacle hindering long-term sensor network deployments is power consumption. To address this problem, our software powers down sensors between sampling cycles and turns off the radio (the most energy prohibitive mote component) when not in use. By doing so we were able to increase node lifetime by a factor of ten. We collected field data over several weeks. The data was ingested into a SQL Server database, which provides data access through a .NET web services interface. The database provides functions for spatial

  3. DMP Packet Scheduling For Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Pallavi Sawale

    2015-01-01

    Full Text Available Most of the existing packet scheduling mechanisms of the wireless sensor network use First Come First Served (FCFS non pre emptive priority and pre emptive priority scheduling algorithms. The above algorithms have high processing overhead and also long end-to-end data transmission delay. In FCFS concept the data packet which is entering the node first will go out first from the node, and the packet which will enter last will leave at last. But in FCFS scheduling of real time data packets coming to the node have to wait for a long time period.In non pre emptive priority scheduling algorithm there is starvation of real time data packets because once the processor enters the running state, it will not allow remove until it is completed, so there is starvation of real time data packets. In pre emptive scheduling, starvation of non real time data packets, due to continuous arrival of real time data. Therefore the data packets are to be schedule in multilevel queue. But the multilevel queue scheduling scheme is not suitable for dynamic inputs, and hence the scheme is designed for dynamically change in the inputs. The Dynamic Multilevel Priority (DMP packet scheduling is the scheme for dynamically changes in the inputs. In this scheme each node except the last level of the virtual hierarchy in the zone based topology of wireless sensor network has three levels of priority queues. Real time data packets are placed into highest priority queue and can preempt the data packets in the other queues. Non real time data packets are placed into other two queues based on threshold of their estimated processing time. The leaf node have two queues, one for real time data packet and another for non real time data packet since they do not receive data from other nodes and thus reduces end to end delay. This scheme reduces the average waiting time and end-to –end delay of data packets.

  4. Reliability Analysis of Wireless Sensor Networks Using Markovian Model

    Directory of Open Access Journals (Sweden)

    Jin Zhu

    2012-01-01

    Full Text Available This paper investigates reliability analysis of wireless sensor networks whose topology is switching among possible connections which are governed by a Markovian chain. We give the quantized relations between network topology, data acquisition rate, nodes' calculation ability, and network reliability. By applying Lyapunov method, sufficient conditions of network reliability are proposed for such topology switching networks with constant or varying data acquisition rate. With the conditions satisfied, the quantity of data transported over wireless network node will not exceed node capacity such that reliability is ensured. Our theoretical work helps to provide a deeper understanding of real-world wireless sensor networks, which may find its application in the fields of network design and topology control.

  5. Throughput Improvement In Wireless Mesh Networks By Integrating With Optical Network

    Directory of Open Access Journals (Sweden)

    Chakrapani gadde

    2012-06-01

    Full Text Available In the last decade wireless mesh networks (WMNs have emerged as a key technology for next generation wireless networking. Because of their advantages over other wireless networks, WMNs are undergoing rapid progress and inspiring numerous applications. One such application is to provide peer-to-peer communication for all the users who are distributed over some area. Since the users are connected in awireless multi-hop passion complete ubiquity is provided. But as the number of users accessing the network is increasing there could be a chance of experiencing more interference by each user due to the communication link of every other user. So in a wireless mesh network as the load increases the throughput of network is going to be decreased due to wireless interference by other users. To sustain this problem we are going to integrate the WMN with passive optical network (PON. The resulting hybrid network (Optical-wireless network could reduce the wireless hops of each user, so that we can reduce the total wireless interference experienced by each user resulting in improved network throughput. This paper aims to study the network throughput gain in Optical-wireless network subject to peer-to-peer communications.

  6. Wireless Sensor Networks for Environmental Monitoring

    Science.gov (United States)

    Liang, X.; Liang, Y.; Navarro, M.; Zhong, X.; Villalba, G.; Li, Y.; Davis, T.; Erratt, N.

    2015-12-01

    Wireless sensor networks (WSNs) have gained an increasing interest in a broad range of new scientific research and applications. WSN technologies can provide high resolution for spatial and temporal data which has not been possible before, opening up new opportunities. On the other hand, WSNs, particularly outdoor WSNs in harsh environments, present great challenges for scientists and engineers in terms of the network design, deployment, operation, management, and maintenance. Since 2010, we have been working on the deployment of an outdoor multi-hop WSN testbed for hydrological/environmental monitoring in a forested hill-sloped region at the Audubon Society of Western Pennsylvania (ASWP), Pennsylvania, USA. The ASWP WSN testbed has continuously evolved and had more than 80 nodes by now. To our knowledge, the ASWP WSN testbed represents one of the first known long-term multi-hop WSN deployments in an outdoor environment. As simulation and laboratory methods are unable to capture the complexity of outdoor environments (e.g., forests, oceans, mountains, or glaciers), which significantly affect WSN operations and maintenance, experimental deployments are essential to investigate and understand WSN behaviors and performances as well as its maintenance characteristics under these harsh conditions. In this talk, based on our empirical studies with the ASWP WSN testbed, we will present our discoveries and investigations on several important aspects including WSN energy profile, node reprogramming, network management system, and testbed maintenance. We will then provide our insight into these critical aspects of outdoor WSN deployments and operations.

  7. Wireless Sensor Networks Formation: Approaches and Techniques

    Directory of Open Access Journals (Sweden)

    Miriam Carlos-Mancilla

    2016-01-01

    Full Text Available Nowadays, wireless sensor networks (WSNs emerge as an active research area in which challenging topics involve energy consumption, routing algorithms, selection of sensors location according to a given premise, robustness, efficiency, and so forth. Despite the open problems in WSNs, there are already a high number of applications available. In all cases for the design of any application, one of the main objectives is to keep the WSN alive and functional as long as possible. A key factor in this is the way the network is formed. This survey presents most recent formation techniques and mechanisms for the WSNs. In this paper, the reviewed works are classified into distributed and centralized techniques. The analysis is focused on whether a single or multiple sinks are employed, nodes are static or mobile, the formation is event detection based or not, and network backbone is formed or not. We focus on recent works and present a discussion of their advantages and drawbacks. Finally, the paper overviews a series of open issues which drive further research in the area.

  8. Optimizing Retransmission Threshold in Wireless Sensor Networks.

    Science.gov (United States)

    Bi, Ran; Li, Yingshu; Tan, Guozhen; Sun, Liang

    2016-01-01

    The retransmission threshold in wireless sensor networks is critical to the latency of data delivery in the networks. However, existing works on data transmission in sensor networks did not consider the optimization of the retransmission threshold, and they simply set the same retransmission threshold for all sensor nodes in advance. The method did not take link quality and delay requirement into account, which decreases the probability of a packet passing its delivery path within a given deadline. This paper investigates the problem of finding optimal retransmission thresholds for relay nodes along a delivery path in a sensor network. The object of optimizing retransmission thresholds is to maximize the summation of the probability of the packet being successfully delivered to the next relay node or destination node in time. A dynamic programming-based distributed algorithm for finding optimal retransmission thresholds for relay nodes along a delivery path in the sensor network is proposed. The time complexity is O n Δ · max 1 ≤ i ≤ n { u i } , where u i is the given upper bound of the retransmission threshold of sensor node i in a given delivery path, n is the length of the delivery path and Δ is the given upper bound of the transmission delay of the delivery path. If Δ is greater than the polynomial, to reduce the time complexity, a linear programming-based ( 1 + p m i n ) -approximation algorithm is proposed. Furthermore, when the ranges of the upper and lower bounds of retransmission thresholds are big enough, a Lagrange multiplier-based distributed O ( 1 ) -approximation algorithm with time complexity O ( 1 ) is proposed. Experimental results show that the proposed algorithms have better performance. PMID:27171092

  9. On the Capacity of Hybrid Wireless Networks with Opportunistic Routing

    Directory of Open Access Journals (Sweden)

    Tan Le

    2010-01-01

    Full Text Available This paper studies the capacity of hybrid wireless networks with opportunistic routing (OR. We first extend the opportunistic routing algorithm to exploit high-speed data transmissions in infrastructure network through base stations. We then develop linear programming models to calculate the end-to-end throughput bounds from multiple source nodes to single as well as multiple destination nodes. The developed models are applied to study several hybrid wireless network examples. Through case studies, we investigate several factors that have significant impacts on the hybrid wireless network capacity under opportunistic routing, such as node transmission range, density and distribution pattern of base stations (BTs, and number of wireless channels on wireless nodes and base stations. Our numerical results demonstrate that opportunistic routing could achieve much higher throughput on both ad hoc and hybrid networks than traditional unicast routing (UR. Moreover, opportunistic routing can efficiently utilize base stations and achieve significantly higher throughput gains in hybrid wireless networks than in pure ad hoc networks especially with multiple-channel base stations.

  10. The Tiny Agent - Wireless Sensor Networks Controlling Energy Resources

    Directory of Open Access Journals (Sweden)

    Glenn Platt

    2008-04-01

    Full Text Available CSIRO is using wireless sensor network technology to deploy “tiny agents”, working as autonomous controllers for individual pieces of electrical load/generation equipment in a distributed energy system. The tiny agent concept is a novel application of wireless sensor networks, providing the benefits of multi-agent systems science in a cheap, mobile, and highly distributable platform. However, the performance constraints inherent to wireless sensor networks mean the real-world realization of a tiny agent system is a significant challenge. This article details our work on tiny agents. We include a brief review of multiagent system benefits, and then discuss the challenges inherent to the tiny agent concept. We also detail our applications work in applying wireless sensor network technology to operate as tiny agents, with a focus on intelligent heating, ventilation and air- conditioning control.

  11. CAREER researchers merge game theory with wireless networks, create

    OpenAIRE

    Crumbley, Liz

    2005-01-01

    Using economic theory to improve wireless communications networks and designing garments that can sense their own shapes are among the goals of two National Science Foundation Faculty Early Career Development Program (CAREER) Award projects recently funded at Virginia Tech.

  12. Reliable adaptive multicast protocol in wireless Ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    Sun Baolin; Li Layuan

    2006-01-01

    In wireless ad hoc network environments, every link is wireless and every node is mobile. Those features make data lost easily as well as multicasting inefficient and unreliable. Moreover, Efficient and reliable multicast in wireless ad hoc network is a difficult issue. It is a major challenge to transmission delays and packet losses due to link changes of a multicast tree at the provision of high delivery ratio for each packet transmission in wireless ad hoc network environment.In this paper, we propose and evaluate Reliable Adaptive Multicast Protocol (RAMP) based on a relay node concept. Relay nodes are placed along the multicast tree. Data recovery is done between relay nodes. RAMP supports a reliable multicasting suitable for mobile ad hoc network by reducing the number of packet retransmissions. We compare RAMP with SRM (Scalable Reliable Multicast). Simulation results show that the RAMP has high delivery ratio and low end-to-end delay for packet transmission.

  13. Resource aware sensor nodes in wireless sensor networks

    International Nuclear Information System (INIS)

    Wireless sensor networks are continuing to receive considerable research interest due, in part, to the range of possible applications. One of the greatest challenges facing researchers is in overcoming the limited network lifetime inherent in the small locally powered sensor nodes. In this paper, we propose IDEALS, a system to manage a wireless sensor network using a combination of information management, energy harvesting and energy monitoring, which we label resource awareness. Through this, IDEALS is able to extend the network lifetime for important messages, by controlling the degradation of the network to maximise information throughput

  14. Time synchronization in ad-hoc wireless sensor networks

    Science.gov (United States)

    Sharma, Nishant

    2013-06-01

    Advances in micro-electronics and developments in the various technologies have given birth to this era of wireless sensor networks. A sensor network is the one which provides information about the surrounding environment by sensing it and clock synchronization in wireless sensor networks plays a vital role to maintain the integrity of entire network. In this paper two major low energy consumption clock synchronization algorithms, Reference Broadcast Synchronization (RBS) and Timing-Sync Protocol for Sensor Networks (TPSN) are simulated, which result in high level of accuracy, reliability, handles substantially greater node densities, supports mobility, and hence perform well under all possible conditions.

  15. Analysis of Security Protocols in Wireless Sensor Network

    OpenAIRE

    Ritu Sharma; Yogesh Chaba; Yudhvir Singh

    2010-01-01

    Wireless Sensor Networks(WSNs) consists of low power, low-cost smart devices which have limited computing resources. With a widespread growth of the applications of WSN, the security mechanisms are also be a rising big issue. A lot of realworld applications have been already deployed and many of them will be based on wireless sensor networks. These applications include geographical monitoring, medical care, manufacturing, transportation, military operations, environmental monitoring, indus...

  16. Cellular Underwater Wireless Optical CDMA Network: Potentials and Challenges

    OpenAIRE

    Akhoundi, Farhad; Jamali, Mohammad Vahid; Banihassan, Navid; Beyranvand, Hamzeh; Minoofar, Amir; Salehi, Jawad A.

    2016-01-01

    Underwater wireless optical communications is an emerging solution to the expanding demand for broadband links in oceans and seas. In this paper, a cellular underwater wireless optical code division multiple-access (UW-OCDMA) network is proposed to provide broadband links for commercial and military applications. The optical orthogonal codes (OOC) are employed as signature codes of underwater mobile users. Fundamental key aspects of the network such as its backhaul architecture, its potential...

  17. Energy Aware Cluster Based Routing Scheme For Wireless Sensor Network

    OpenAIRE

    Roy Sohini

    2015-01-01

    Wireless Sensor Network (WSN) has emerged as an important supplement to the modern wireless communication systems due to its wide range of applications. The recent researches are facing the various challenges of the sensor network more gracefully. However, energy efficiency has still remained a matter of concern for the researches. Meeting the countless security needs, timely data delivery and taking a quick action, efficient route selection and multi-path routing etc. can only be achieved at...

  18. Collaborative Algorithms for Communication in Wireless Sensor Networks

    OpenAIRE

    Nieberg, Tim; Dulman, Stefan; Havinga, Paul; Hoesel, van, CPM Stan; Wu, Jian; Basten, Twan; Geilen, Marc; Groot

    2003-01-01

    In this paper, we present the design of the communication in a wireless sensor network. The resource limitations of a wireless sensor network, especially in terms of energy, require an integrated, and collaborative approach for the different layers of communication. In particular, energy-efficient solutions for medium access control, clusterbased routing, and multipath creation and exploitation are discussed. The proposed MAC protocol is autonomous, decentralized and designed to minimize powe...

  19. Collaborative algorithms for communication in wireless sensor networks

    OpenAIRE

    Nieberg, Tim; Dulman, Stefan; Havinga, Paul; Hoesel, van, CPM Stan; Wu, Jian

    2003-01-01

    In this paper, we present the design of the communication in a wireless sensor network. The resource limitations of a wireless sensor network, especially in terms of energy, require an integrated, and collaborative approach for the different layers of communication. In particular, energy-efficient solutions for medium access control, clusterbased routing, and multipath creation and exploitation are discussed. The proposed MAC protocol is autonomous, decentralized and designed to minimize powe...

  20. SYS3: Cyclops: Image Based Sensing for Wireless Sensor Networks

    OpenAIRE

    Mohammad Rahimi; Deborah Estrin; Mani Srivastava; Rick Baer (Agilent); Jay Warrior (Agilent)

    2005-01-01

    Despite their increasing sophistication, wireless sensor networks still do not exploit the most powerful of the human senses: vision. Indeed, vision provides humans with unmatched capabilities to distinguish objects and identify their importance. This work seeks to provide wireless sensor networks with similar capabilities by exploiting emerging, cheap, low-power and small form factor CMOS imaging technology. In fact, we go beyond the stereo capabilities of human vision, and exploit the large...

  1. Communication Timing Control with Interference Detection for Wireless Sensor Networks

    OpenAIRE

    Kokuke Sekiyama; Yuki Kubo

    2006-01-01

    This paper deals with a novel communication timing control for wireless networks and radio interference problem. Communication timing control is based on the mutual synchronization of coupled phase oscillatory dynamics with a stochastic adaptation, according to the history of collision frequency in communication nodes. Through local and fully distributed interactions in the communication network, the coupled phase dynamics self-organizes collision-free communication. In wireless communicatio...

  2. Traffic Flow Detection Based on Wireless Sensor Network

    OpenAIRE

    Bao-juan Liang

    2013-01-01

    Detecting traffic flow by in-road inductive loop is the most common methods, but inductive loop is physically large, it is hard to install and maintain, also the classification rate is low. The inductive loops cannot communicate with each other, so they cannot share traffic data with each other. The wireless sensor network has these features: real-time, fault tolerance, scalability and coordination. Applying wireless sensor network into traffic area for traffic flow detection is easier to ins...

  3. Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends

    OpenAIRE

    Gyanendra Prasad Joshi; Sung Won Kim; Seung Yeob Nam

    2013-01-01

    A cognitive radio wireless sensor network is one of the candidate areas where cognitive techniques can be used for opportunistic spectrum access. Research in this area is still in its infancy, but it is progressing rapidly. The aim of this study is to classify the existing literature of this fast emerging application area of cognitive radio wireless sensor networks, highlight the key research that has already been undertaken, and indicate open problems. This paper describes the advantages of ...

  4. Compatibility Issues of IPSec and TCP in Wireless Networks

    Institute of Scientific and Technical Information of China (English)

    ZHAO Hai-yang; XIN Yang

    2004-01-01

    Due to the problems arising when the Transmission Control Protocol (TCP) is applied over wireless networks, many TCP performance enhancement mechanisms have been proposed. However, such mechanisms aren't compatible with IPSec protocol. The paper reviews the TCP performance enhancement mechanisms in wireless networks. Then the conflicts between them are analyzed. Several proposals for solving theconflicts are discussed, and their benefit and limitations are examined.

  5. Coverage and Connectivity Issue in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Rachit Trivedi

    2013-04-01

    Full Text Available Wireless sensor networks (WSNs are an emerging area of interest in research and development. It finds use in military surveillance, health care, environmental monitoring, forest fire detection and smart environments. An important research issue in WSNs is the coverage since cost, area and lifetime are directly validated to it.In this paper we present an overview of WSNs and try to refine the coverage and connectivity issues in wireless sensor networks.

  6. Intrusion Detection System in Wireless Sensor Networks: A Review

    OpenAIRE

    Anush Ananthakumar; Tanmay Ganediwal; Dr. Ashwini Kunte

    2015-01-01

    The security of wireless sensor networks is a topic that has been studied extensively in the literature. The intrusion detection system is used to detect various attacks occurring on sensor nodes of Wireless Sensor Networks that are placed in various hostile environments. As many innovative and efficient models have emerged in the last decade in this area, we mainly focus our work on Intrusion detection Systems. This paper reviews various intrusion detection systems which can be broadly class...

  7. Seamless and secure communications over heterogeneous wireless networks

    CERN Document Server

    Cao, Jiannong

    2014-01-01

    This brief provides an overview of the requirements, challenges, design issues and major techniques for seamless and secure communications over heterogeneous wireless networks. It summarizes and provides detailed insights into the latest research on handoff management, mobility management, fast authentication and security management to support seamless and secure roaming for mobile clients. The reader will also learn about the challenges in developing relevant technologies and providing ubiquitous Internet access over heterogeneous wireless networks. The authors have extensive experience in im

  8. Optimisation and algorithms in wireless networks for mission critical applications

    OpenAIRE

    Tavakoli Dehkordi , Anousheh

    2015-01-01

    The focus of this dissertation is to present novel algorithms and techniques in wireless network systems aiming at performance optimisation. This thesis provides contribution to knowledge on the following topics: (a) sum rate maximisation of two interfering users in an Orthogonal Frequency Division Multiple Access (OFDMA)-based cooperative base stations and (b) event-region detection in Wireless Sensor Networks (WSNs). The first area of work makes contribution on problem of maximising t...

  9. Enhancements of LEACH Algorithm for Wireless Networks: A Review

    Directory of Open Access Journals (Sweden)

    M. Madheswaran

    2013-12-01

    Full Text Available Low Energy Adaptive Clustering Hierarchy (LEACH protocol is the first hierarchical cluster based routing protocol successfully used in the Wireless Sensor Networks (WSN. In this paper, various enhancements used in the original LEACH protocol are examined. The basic operations, advantages and limitations of the modified LEACH algorithms are compared to identify the research issues to be solved and to give the suggestions for the future proposed routing algorithms of wireless networks based on LEACH routing algorithm.

  10. High Fidelity Simulations of Large-Scale Wireless Networks

    Energy Technology Data Exchange (ETDEWEB)

    Onunkwo, Uzoma [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Benz, Zachary [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-11-01

    The worldwide proliferation of wireless connected devices continues to accelerate. There are 10s of billions of wireless links across the planet with an additional explosion of new wireless usage anticipated as the Internet of Things develops. Wireless technologies do not only provide convenience for mobile applications, but are also extremely cost-effective to deploy. Thus, this trend towards wireless connectivity will only continue and Sandia must develop the necessary simulation technology to proactively analyze the associated emerging vulnerabilities. Wireless networks are marked by mobility and proximity-based connectivity. The de facto standard for exploratory studies of wireless networks is discrete event simulations (DES). However, the simulation of large-scale wireless networks is extremely difficult due to prohibitively large turnaround time. A path forward is to expedite simulations with parallel discrete event simulation (PDES) techniques. The mobility and distance-based connectivity associated with wireless simulations, however, typically doom PDES and fail to scale (e.g., OPNET and ns-3 simulators). We propose a PDES-based tool aimed at reducing the communication overhead between processors. The proposed solution will use light-weight processes to dynamically distribute computation workload while mitigating communication overhead associated with synchronizations. This work is vital to the analytics and validation capabilities of simulation and emulation at Sandia. We have years of experience in Sandia’s simulation and emulation projects (e.g., MINIMEGA and FIREWHEEL). Sandia’s current highly-regarded capabilities in large-scale emulations have focused on wired networks, where two assumptions prevent scalable wireless studies: (a) the connections between objects are mostly static and (b) the nodes have fixed locations.

  11. Wireless sensor and ad hoc networks under diversified network scenarios

    CERN Document Server

    Sarkar, Subir Kumar

    2012-01-01

    Due to significant advantages, including convenience, efficiency and cost-effectiveness, the implementation and use of wireless ad hoc and sensor networks have gained steep growth in recent years. This timely book presents the current state-of-the-art in these popular technologies, providing you with expert guidance for your projects in the field. You find broad-ranging coverage of important concepts and methods, definitions of key terminology, and a look at the direction of future research. Supported with nearly 150 illustrations, the book discusses a variety of critical topics, from topology

  12. Fair packet scheduling in Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal

    2014-02-01

    In this paper we study the interactions of TCP and IEEE 802.11 MAC in Wireless Mesh Networks (WMNs). We use a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput due to the effect of queue utilization and packet relaying. A closed form solution is derived to numerically determine the throughput. Based on the developed model, we propose a distributed MAC protocol called Timestamp-ordered MAC (TMAC), aiming to alleviate the unfairness problem in WMNs. TMAC extends CSMA/CA by scheduling data packets based on their age. Prior to transmitting a data packet, a transmitter broadcasts a request control message appended with a timestamp to a selected list of neighbors. It can proceed with the transmission only if it receives a sufficient number of grant control messages from these neighbors. A grant message indicates that the associated data packet has the lowest timestamp of all the packets pending transmission at the local transmit queue. We demonstrate that a loose ordering of timestamps among neighboring nodes is sufficient for enforcing local fairness, subsequently leading to flow rate fairness in a multi-hop WMN. We show that TMAC can be implemented using the control frames in IEEE 802.11, and thus can be easily integrated in existing 802.11-based WMNs. Our simulation results show that TMAC achieves excellent resource allocation fairness while maintaining over 90% of maximum link capacity across a large number of topologies.

  13. Multirate Anypath Routing in Wireless Mesh Networks

    CERN Document Server

    Laufer, Rafael

    2008-01-01

    In this paper, we present a new routing paradigm that generalizes opportunistic routing in wireless mesh networks. In multirate anypath routing, each node uses both a set of next hops and a selected transmission rate to reach a destination. Using this rate, a packet is broadcast to the nodes in the set and one of them forwards the packet on to the destination. To date, there is no theory capable of jointly optimizing both the set of next hops and the transmission rate used by each node. We bridge this gap by introducing a polynomial-time algorithm to this problem and provide the proof of its optimality. The proposed algorithm runs in the same running time as regular shortest-path algorithms and is therefore suitable for deployment in link-state routing protocols. We conducted experiments in a 802.11b testbed network, and our results show that multirate anypath routing performs on average 80% and up to 6.4 times better than anypath routing with a fixed rate of 11 Mbps. If the rate is fixed at 1 Mbps instead, p...

  14. Fast notification architecture for wireless sensor networks

    Science.gov (United States)

    Lee, Dong-Hahk

    2013-03-01

    In an emergency, since it is vital to transmit the message to the users immediately after analysing the data to prevent disaster, this article presents the deployment of a fast notification architecture for a wireless sensor network. The sensor nodes of the proposed architecture can monitor an emergency situation periodically and transmit the sensing data, immediately to the sink node. We decide on the grade of fire situation according to the decision rule using the sensing values of temperature, CO, smoke density and temperature increasing rate. On the other hand, to estimate the grade of air pollution, the sensing data, such as dust, formaldehyde, NO2, CO2, is applied to the given knowledge model. Since the sink node in the architecture has a ZigBee interface, it can transmit the alert messages in real time according to analysed results received from the host server to the terminals equipped with a SIM card-type ZigBee module. Also, the host server notifies the situation to the registered users who have cellular phone through short message service server of the cellular network. Thus, the proposed architecture can adapt an emergency situation dynamically compared to the conventional architecture using video processing. In the testbed, after generating air pollution and fire data, the terminal receives the message in less than 3 s. In the test results, this system can also be applied to buildings and public areas where many people gather together, to prevent unexpected disasters in urban settings.

  15. Deterministic Secure Positioning in Wireless Sensor Networks

    CERN Document Server

    Delaët, Sylvie; Rokicki, Mariusz; Tixeuil, Sébastien

    2007-01-01

    Properly locating sensor nodes is an important building block for a large subset of wireless sensor networks (WSN) applications. As a result, the performance of the WSN degrades significantly when misbehaving nodes report false location and distance information in order to fake their actual location. In this paper we propose a general distributed deterministic protocol for accurate identification of faking sensors in a WSN. Our scheme does \\emph{not} rely on a subset of \\emph{trusted} nodes that are not allowed to misbehave and are known to every node in the network. Thus, any subset of nodes is allowed to try faking its position. As in previous approaches, our protocol is based on distance evaluation techniques developed for WSN. On the positive side, we show that when the received signal strength (RSS) technique is used, our protocol handles at most $\\lfloor \\frac{n}{2} \\rfloor-2$ faking sensors. Also, when the time of flight (ToF) technique is used, our protocol manages at most $\\lfloor \\frac{n}{2} \\rfloor...

  16. Healthcare Monitoring System Using Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    D. Mahesh Kumar

    2012-07-01

    Full Text Available Using Wireless Sensor Networks (WSNs in health care system has yielded a tremendous effort in recent years. However, in most of these researches, tasks like sensor data processing, health state decisions making and emergency messages sending are completed by a remote server. Transmitting and handing with a large scale of data from body sensors consume a lot of communication resource, bring a burden to the remote server and delay the decision time and notification time. In this paper, we present a prototype of a smart gateway that we have implemented. This gateway is an interconnection and services management platform especially for WSN health care systems at home environment. By building a bridge between a WSN and public communication networks, and being compatible with an onboard data decision system and a lightweight database, our smart gateway system is enabled to make patients' health state decisions in low-power and low-cost embedded system and get faster response time o the emergencies. We have also designed the communication protocols between WSN, gateway and remote servers. Additionally Ethernet, Wi-Fi and GSM/GPRS communication module are integrated into the smart gateway in order to report and notify information to care-givers.

  17. Loss Discrimination Algorithm for Wired/Wireless Networks

    Directory of Open Access Journals (Sweden)

    Liw J. Seng

    2011-01-01

    Full Text Available Problem statement: Wireless technology has far growing with an increasing demand of the Wireless networking technologies recent years. The wireless access network and cellular networks are being used to support their need. It is usually connected to a wired backbone network. TCP is used to handle the congestion in wired network. However, it is not well suited for hybrid network consisting of wired and wireless networks. Packet loss occurs in wireless network mostly due to high bit error rate, varying in transmission length, or link failure. These scenarios are always misinterpreted by conventional TCP as a congestion loss. Hence, TCP sender performs congestion control which is unnecessary and leads to a poor network performance. Approach: A new algorithm proposed in this study is to differentiate the types of packet loss accurately. The algorithm will classify the packet loss and invoke proper correction mechanisms. Results: Our simulation results show the improvement of TCP performance as compared to the existing Selective-TCP and TCP NewReno. Conclusion: The proposed algorithm on classifying packet loss shows the improvement of TCP performance.

  18. Integrated resource management for Hybrid Optical Wireless (HOW) networks

    DEFF Research Database (Denmark)

    Yan, Ying; Yu, Hao; Wessing, Henrik;

    2009-01-01

    Efficient utilization of available bandwidth over hybrid optical wireless networks is a critical issue, especially for multimedia applications with high data rates and stringent Quality of Service (QoS) requirements. In this paper, we propose an integrated resource management including an enhanced...... resource sharing scheme and an integrated admission control scheme for the hybrid optical wireless networks. It provides QoS guarantees for connections through both optical and wireless domain. Simulation results show that our proposed scheme improves QoS performances in terms of high throughput and low...

  19. On the Design and Implementation of Wireless Multimedia Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qing Pang

    2010-09-01

    Full Text Available Wireless Sensor Networks (WSN mainly deal with scalar data such as temperature, humidity, and lightwhich are very suitable for low rate and low power IEEE 802.15 based networking technology. Thecommercial off-the-shelf (COTS CMOS camera has fostered researchers to push WSN a step further.The unique properties of multimedia data delivery pose fresh challenges for resource constrained sensornetworks. Transmitting raw data is very costly while limited processing power prevents sophisticatedmultimedia processing at the sensor nodes. Wireless sensor networks offer an attractive choice for lowcost solutions for transmitting data wirelessly to a database to be evaluated. Wireless networks of visualsensors have recently emerged as a new type of sensor-based intelligence system. The goal of the visualsensor network is to provide a user with visual information from an arbitrary viewpoint within themonitored field. Wireless networks in combination with image sensors open up a multitude of previouslyunthinkable sensing applications. In an on-going project, we are designing and implementing a sensornode with a camera which would be capable of acquiring still images, transfer the data onto a personalcomputer through wireless communication, and store the image on a personal computer. This paperexplains the process of capturing the raw image data with a camera sensor and the interfacing of thecamera with the Overo Air computer-on-module (COM. Camera visibility and resolution will also beexplained in this paper along with the procedure taken to configure the sensor node.

  20. Wireless sensor network for streetlight monitoring and control

    Science.gov (United States)

    Huang, Xin-Ming; Ma, Jing; Leblanc, Lawrence E.

    2004-08-01

    Wireless sensor network has attracted considerable research attention as the world becomes more information oriented. This technology provides an opportunity of innovations in traditional industries. Management and control of streetlight system is a labor-intensive high-cost task for public facility operations. This paper applies wireless sensor network technology in streetlight monitoring and control. Wireless sensor networks are employed to replace traditional physical patrol maintenance and manual switching on every lamp in the street or along the highway at the aim of reducing the maintenance and management expense. Active control is used to preserve energy cost while ensuring public safety. A proof-of-concept network architecture operated at 900 MHz industrial, scientific, and medical (ISM) band is designed for a two-way wireless telemetry system in streetlight remote control and monitoring. The radio architecture, multi-hop protocol and system interface are discussed in detail. MOTES sensor nodes are used in simulation and experimental tests. Simulation results show that the sensor network approach provides an efficient solution to monitor and control lighting infrastructures through wireless links. The unique application in this paper addresses an immediate need in streetlight control and monitoring, the architecture developed in this research could also serve as a platform for many other applications and researches in wireless sensor network.

  1. RSS based Vertical Handoff algorithms for Heterogeneous wireless networks - A Review

    Directory of Open Access Journals (Sweden)

    Abhijit Bijwe

    2011-08-01

    Full Text Available Heterogeneous networks are integrated in fourth generation. To have seamless communication and mobility between these heterogeneous wireless access networks, support of vertical handoff is required. Vertical handover is convergence of heterogeneous networks for e.g.:- handover between WLAN and cellular networks. In this paper, three algorithms on RSS based vertical handoff are discussed. First, algorithm is adaptive lifetime based vertical handoff, which combines RSS and estimated lifetime (expected duration after which the MT will be able to maintain its connection with WLAN to decide the vertical handover. Second algorithm, is based on dynamic RSS threshold which is more suitable for handover from WLAN to 3G network. Third algorithm is a traveling distance prediction method, which works well for WLAN to cellular networks and vice versa. This avoids unnecessary handoff and also minimizes failure probability.

  2. A Vascular-Network-Based Nonuniform Hierarchical Fault-Tolerant Routing Algorithm for Wireless Sensor Networks

    OpenAIRE

    Hongbing Li; Peng Gao; Qingyu Xiong; Weiren Shi; Qiang Chen

    2012-01-01

    Fault tolerance is the key technology in wireless sensor networks which attracts many research interests. Aiming at the issue that the nodes' failures affect the network's stability and service quality, a vascular-network-based fault-tolerant routing algorithm is presented by nonuniform hierarchical clustering. According to the distribution characteristics of the vascular network and inspirations to the fault tolerance for wireless sensor networks, a mathematical model and network topology ar...

  3. Low power radio communication platform for wireless sensor network

    NARCIS (Netherlands)

    Dutta, R.; Bentum, M.J.; Zee, van der R.A.R.; Kokkeler, A.B.J.

    2009-01-01

    Wireless sensor networks are predicted to be the most versatile, popular and useful technology in the near future. A large number of applications are targeted which will hugely benefit from a network of tiny computers with few sensors, radio communication platform, intelligent networking and control

  4. 47 CFR 27.1305 - Shared wireless broadband network.

    Science.gov (United States)

    2010-10-01

    ... must be designed to meet requirements associated with a nationwide, public safety broadband network. At a minimum, the network must incorporate the following features: (a) Design for operation over a... 47 Telecommunication 2 2010-10-01 2010-10-01 false Shared wireless broadband network....

  5. Low-power Radar for Wireless Sensor Networks

    NARCIS (Netherlands)

    Ditzel, M.; Elferink, F.H.

    2006-01-01

    Abstract—This paper presents the results of a short study on the feasibility of radars as the primary means of sensing in ad-hoc wireless sensor networks. Radar offers distinct advantages over others means of sensing, normally found in this kind of networks. The sensor networks being considered cons

  6. Performance Modeling for Heterogeneous Wireless Networks with Multiservice Overflow Traffic

    DEFF Research Database (Denmark)

    Huang, Qian; Ko, King-Tim; Iversen, Villy Bæk

    2009-01-01

    Performance modeling is important for the purpose of developing efficient dimensioning tools for large complicated networks. But it is difficult to achieve in heterogeneous wireless networks, where different networks have different statistical characteristics in service and traffic models....... Multiservice loss analysis based on multi-dimensional Markov chain becomes intractable in these networks due to intensive computations required. This paper focuses on performance modeling for heterogeneous wireless networks based on a hierarchical overlay infrastructure. A method based on decomposition...... of the correlated traffic is used to achieve an approximate performance modeling for multiservice in hierarchical heterogeneous wireless networks with overflow traffic. The accuracy of the approximate performance obtained by our proposed modeling is verified by simulations....

  7. A Power Balance Aware Wireless Charger Deployment Method for Complete Coverage in Wireless Rechargeable Sensor Networks

    Directory of Open Access Journals (Sweden)

    Tu-Liang Lin

    2016-08-01

    Full Text Available Traditional sensor nodes are usually battery powered, and the limited battery power constrains the overall lifespan of the sensors. Recently, wireless power transmission technology has been applied in wireless sensor networks (WSNs to transmit wireless power from the chargers to the sensor nodes and solve the limited battery power problem. The combination of wireless sensors and wireless chargers forms a new type of network called wireless rechargeable sensor networks (WRSNs. In this research, we focus on how to effectively deploy chargers to maximize the lifespan of a network. In WSNs, the sensor nodes near the sink consume more power than nodes far away from the sink because of frequent data forwarding. This important power unbalanced factor has not been considered, however, in previous charger deployment research. In this research, a power balance aware deployment (PBAD method is proposed to address the power unbalance in WRSNs and to design the charger deployment with maximum charging efficiency. The proposed deployment method is effectively aware of the existence of the sink node that would cause unbalanced power consumption in WRSNs. The simulation results show that the proposed PBAD algorithm performs better than other deployment methods, and fewer chargers are deployed as a result.

  8. Performance Evaluation and Optimization of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Dr Jayant Dubey

    2013-06-01

    Full Text Available A wireless sensor network (WSN is an ad-hoc network composed of small sensor nodes deployed in large numbers to sense the physical world. Wireless sensor networks have very broad application prospects including both military and civilian usage. They include surveillance, tracking at critical facilities, or monitoring animal habitats. Sensor networks have the potential to radically change the way people observe and interact with their environment. With current wireless sensor network technology, people will gain advanced knowledge of physical and social systems, and the advent of a ubiquitous sensing era is coming. In-network processing or data aggregation is an essential function of WSNs to collect raw sensory data and get aggregated statistics about the measured environment, and help queries capture the major feature or changes of the measured systems. As more and more applications of WSNs collect sensitive measurements of people’s everyday life, privacy and security concerns draw more and more attention. If privacy of sensory content is not preserved, it is not feasible to deploy the WSNs for information collection. On the other hand, if integrity of the collected sensory information is not protected, no queries or users can trust and/or use the collected information. Hence, two important issues should be addressed before wireless sensor network systems can realize their promise in civilian applications: (1 protect data privacy, so the deployment of the wireless sensor network systems is feasible; (2 enforce integrity, so users can trust the collected or aggregated information.

  9. Challenges for Environmental Wireless Sensor Networks (WSNs) (Invited)

    Science.gov (United States)

    Liang, X.; Davis, T. W.

    2013-12-01

    There are many challenges posed to researchers looking to collect eco-hydrological information with monitoring systems exposed to the natural environment due, in part, to the unpredictable interactions between the environment and the wireless hardware and the scale of the deployment. While wireless sensor network technology has introduced autonomy and pervasiveness to studying the environment, it is not a panacea for outdoor monitoring systems. Despite the fact that each outdoor deployment will encounter its own unique set of challenges, it is often a benefit to researchers to know what problems were faced during other deployments and how these problems were mitigated or solved. This work examines a long-term (i.e., multi-year) environmental wireless sensor network which was deployed in a forested hill-sloped region of western Pennsylvania, USA and the main challenges that were encountered. These include: (1) the startup and maintenance costs of the wireless network; (2) the data collection system and remote access to the network; (3) the security of the network hardware and software; and (4) the reliability of wireless network connectivity. Based on our field study, it was found that while wireless sensor networks (WSNs) have less expensive startup costs compared to similarly sized wired systems (such as data logging), the WSN has relatively high maintenance costs as it requires frequent site visits (mean of 38 days per wireless node). One possible way to reduce the maintenance costs is by adjusting the sampling and/or collection frequency of the wireless nodes. In addition to the high maintenance costs, wireless communications, especially over complex networks, have low success rates of data capture from the field (approximately 50%). Environmental conditions, such as background noise, interference and weather conditions, may significantly influence the wireless communications. Technological advancements (such as smart sampling and data compression) are being

  10. An Anonymous Authentication and Communication Protocol for Wireless Mesh Networks

    CERN Document Server

    Sen, Jaydip

    2011-01-01

    Wireless mesh networks (WMNs) have emerged as a key technology for next generation wireless broadband networks showing rapid progress and inspiring numerous compelling applications. A WMN comprises of a set of mesh routers (MRs) and mesh clients (MCs), where MRs are connected to the Internet backbone through the Internet gateways (IGWs). The MCs are wireless devices and communicate among themselves over possibly multi-hop paths with or without the involvement of MRs. User privacy and security have been primary concerns in WMNs due to their peer-to-peer network topology, shared wireless medium, stringent resource constraints, and highly dynamic environment. Moreover, to support real-time applications, WMNs must also be equipped with robust, reliable and efficient communication protocols so as to minimize the end-to-end latency and packet drops. Design of a secure and efficient communication protocol for WMNs, therefore, is of paramount importance. In this paper, we propose a security and privacy protocol that ...

  11. Cross-Layer Protocols for Multimedia Communications over Wireless Networks

    CERN Document Server

    Sen, Jaydip

    2011-01-01

    In the last few years, the Internet throughput, usage and reliability have increased almost exponentially. The introduction of broadband wireless mobile ad hoc networks (MANETs) and cellular networks together with increased computational power have opened the door for a new breed of applications to be created, namely real-time multimedia applications. Delivering real-time multimedia traffic over a complex network like the Internet is a particularly challenging task since these applications have strict quality-of-service (QoS) requirements on bandwidth, delay, and delay jitter. Traditional Internet protocol (IP)-based best effort service is not able to meet these stringent requirements. The time-varying nature of wireless channels and resource constrained wireless devices make the problem even more difficult. To improve perceived media quality by end users over wireless Internet, QoS supports can be addressed in different layers, including application layer, transport layer and link layer. Cross layer design i...

  12. Information Security of PHY Layer in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Weidong Fang

    2016-01-01

    Full Text Available Since the characteristics of wireless channel are open and broadcasting, wireless networks are very vulnerable to be attacked via eavesdropping, jamming, and interference. As traditional secure technologies are not suitable for PHY layer of wireless networks, physical-layer security issues become a focus of attention. In this paper, we firstly identify and summarize the threats and vulnerabilities in PHY layer of wireless networks. Then, we give a holistic overview of PHY layer secure schemes, which are divided into three categories: spatial domain-based, time domain-based, and frequency domain-based. Along the way, we analyze the pros and cons of current secure technologies in each category. In addition, we also conclude the techniques and methods used in these categories and point out the open research issues and directions in this area.

  13. Wireless Sensor Networks for Resources Tracking at Building Construction Sites

    Institute of Scientific and Technical Information of China (English)

    SHEN Xuesong; CHEN Wu; LU Ming

    2008-01-01

    We evaluate the technical feasibility of applying emerging wireless network technologies for re-sources tracking at building construction sites.We first identify practical constraints in solving resource-tracking problems in an enclosed or partially covered environment.We then compare pros and cons of available localization principles and examine the latest wireless communication technologies,including Wi-Fi,Bluetooth,Ultra-Wideband(UWB)and ZigBee.We find that the ZigBee-based wireless sensor network and the received signal strength indicator(RSSI)localization method are most promising to tackle on-site tracking of construction resources.Finally,we anticipate some application challenges associated with deploying wireless sensor networks for resources tracking in the practical context.

  14. A Fuzzy Preprocessing Module for Optimizing the Access Network Selection in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Faisal Kaleem

    2013-01-01

    Full Text Available A heterogeneous wireless network is characterized by the presence of different wireless access technologies that coexist in an overlay fashion. These wireless access technologies usually differ in terms of their operating parameters. On the other hand, Mobile Stations (MSs in a heterogeneous wireless network are equipped with multiple interfaces to access different types of services from these wireless access technologies. The ultimate goal of these heterogeneous wireless networks is to provide global connectivity with efficient ubiquitous computing to these MSs based on the Always Best Connected (ABC principle. This is where the need for intelligent and efficient Vertical Handoffs (VHOs between wireless technologies in a heterogeneous environment becomes apparent. This paper presents the design and implementation of a fuzzy multicriteria based Vertical Handoff Necessity Estimation (VHONE scheme that determines the proper time for VHO, while considering the continuity and quality of the currently utilized service, and the end-users' satisfaction.

  15. Multiuser Cooperation with Hybrid Network Coding in Wireless Networks

    Directory of Open Access Journals (Sweden)

    G. Wang

    2014-04-01

    Full Text Available In this paper a hybrid Network Coding Cooperation (hybrid-NCC system is proposed to achieve both reliable transmission and high throughput in wireless networks. To balance the transmission reliability with throughput, the users are divided into cooperative sub-networks based on the geographical information, and the cooperation is implemented in each sub-network. After receiving signals from the cooperative partners, each user encodes them by exploiting hybrid network coding and then forwards the recoded symbols via the Link-Adaptive Regenerative (LAR relaying. First, the Diversity-Multiplexing Tradeoff (DMT is analyzed to demonstrate that the proposed system is bandwidth-efficient. Second, the Symbol Error Probability (SEP is also derived, which shows that the proposed system achieves a higher reliability as compared to the traditional Complex Field Network Coding Cooperation (CFNCC. Moreover, because dedicated relays are not required, our proposed system can both reduce the costs and enhance the flexibility of the implementation. Finally, the analytical results are supported and validated by numerical simulations.

  16. Efficient Intelligent Energy Routing Protocol in Wireless Sensor Networks

    OpenAIRE

    2015-01-01

    In wireless sensor networks energy is a very important issue because these networks consist of lowpower sensor nodes. This paper proposes a new protocol to reach energy efficiency. The protocol has a different priority in energy efficiency as reducing energy consumption in nodes, prolonging lifetime of the whole network, increasing system reliability, increasing the load balance of the network, and reducing packet delays in the network. In the new protocol is proposed an intelligent routing p...

  17. Adaptive scheduling in cellular access, wireless mesh and IP networks

    OpenAIRE

    Nieminen, Johanna

    2011-01-01

    Networking scenarios in the future will be complex and will include fixed networks and hybrid Fourth Generation (4G) networks, consisting of both infrastructure-based and infrastructureless, wireless parts. In such scenarios, adaptive provisioning and management of network resources becomes of critical importance. Adaptive mechanisms are desirable since they enable a self-configurable network that is able to adjust itself to varying traffic and channel conditions. The operation of adaptive me...

  18. Message Routing in Wireless and Mobile Networks Using TDMA Technology

    Directory of Open Access Journals (Sweden)

    Timotheos Aslanidis

    2016-06-01

    Full Text Available In an era where communication has a most important role in modern societies, designing efficient algorithms for data transmission is of the outmost importance. TDMA is a technology used in many communication systems such as satellite, cell phone as well as other wireless or mobile networks. Most 2G cellular systems as well as some 3G are TDMA based. In order to transmit data in such systems we need to cluster them in packages. To achieve a faster transmission we are allowed to preempt the transmission of any packet in order to resume at a later time. Preemption can be used to reduce idleness of some stations.Such preemptions though come with a reconfiguration cost in order to setup for the next transmission. In this paper we propose two algorithms which yield improved transmission scheduling. These two algorithms we call MGA and IMGA (Improved MGA. We have proven an approximation ratio for MGA and ran experiments to establish that it works even better in practice. In order to conclude that MGA will be a very helpful tool in constructing an improved schedule for packet routing using preemtion with a setup cost, we compare its results to two other efficient algorithms designed by researchers in the past: A-PBS(d+1 and GWA. To establish the efficiency of IMGA we ran experiments in comparison to MGA as well as APBS(d+1 and GWA. IMGA has proven to produce the most efficient schedule on all counts

  19. Security in Wireless Sensor Networks: Key Management Module in SOOAWSN

    Directory of Open Access Journals (Sweden)

    Mohammed A. Abuhelaleh

    2010-10-01

    Full Text Available Due to high restrictions in wireless sensor networks, where the resources are limited, clustering protocolsfor routing organization have been proposed in much research for increasing system throughput,decreasing system delay and saving energy. Even these algorithms have proposed some levels of security,but because of their dynamic nature of communication, most of their security solutions are not suitable. Inthis paper we focus on how to achieve the highest possible level of security by applying new keymanagement technique that can be used during wireless sensor networks communications. For ourproposal to be more effective and applicable to a large number of wireless sensor networks applications,we work on a special kind of architecture that have been proposed to cluster hierarchy of wireless sensornetworks and we pick one of the most interesting protocols that have been proposed for this kind ofarchitecture, which is LEACH. This proposal is a module of a complete solution that we are developing tocover all the aspects of wireless sensor networks communication which is labeled Secure Object OrientedArchitecture for Wireless Sensor Networks (SOOAWSN .

  20. Wireless ad hoc and sensor networks management, performance, and applications

    CERN Document Server

    He, Jing

    2013-01-01

    Although wireless sensor networks (WSNs) have been employed across a wide range of applications, there are very few books that emphasize the algorithm description, performance analysis, and applications of network management techniques in WSNs. Filling this need, Wireless Ad Hoc and Sensor Networks: Management, Performance, and Applications summarizes not only traditional and classical network management techniques, but also state-of-the-art techniques in this area. The articles presented are expository, but scholarly in nature, including the appropriate history background, a review of current

  1. Quality of Service Metrics in Wireless Sensor Networks: A Survey

    Science.gov (United States)

    Snigdh, Itu; Gupta, Nisha

    2016-03-01

    Wireless ad hoc network is characterized by autonomous nodes communicating with each other by forming a multi hop radio network and maintaining connectivity in a decentralized manner. This paper presents a systematic approach to the interdependencies and the analogy of the various factors that affect and constrain the wireless sensor network. This article elaborates the quality of service parameters in terms of methods of deployment, coverage and connectivity which affect the lifetime of the network that have been addressed, till date by the different literatures. The analogy of the indispensable rudiments was discussed that are important factors to determine the varied quality of service achieved, yet have not been duly focused upon.

  2. Designing reliable wireless sensor network for nuclear power plant

    International Nuclear Information System (INIS)

    This study proposes an innovative method for the monitoring the nuclear power plant. In this field, false detection of the trouble, both 'false negative' and 'false positive' will become a serious problem. In the other hand, since nuclear power plant is such a complicated system, wireless is required for implementing into real field. Considering these backgrounds, we propose a new reliable health monitoring system for nuclear power plant. This is based on an idea, 'a network on a network', such as 'wireless global network' on 'local network with self-maintenance function.' (author)

  3. An Extended Hierarchical Trusted Model for Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    DU Ruiying; XU Mingdi; ZHANG Huanguo

    2006-01-01

    Cryptography and authentication are traditional approach for providing network security. However, they are not sufficient for solving the problems which malicious nodes compromise whole wireless sensor network leading to invalid data transmission and wasting resource by using vicious behaviors. This paper puts forward an extended hierarchical trusted architecture for wireless sensor network, and establishes trusted congregations by three-tier framework. The method combines statistics, economics with encrypt mechanism for developing two trusted models which evaluate cluster head nodes and common sensor nodes respectively. The models form logical trusted-link from command node to common sensor nodes and guarantees the network can run in secure and reliable circumstance.

  4. Enhancing the performance of future wireless networks with software-defined networking

    Institute of Scientific and Technical Information of China (English)

    Mingjie FENG; Shiwen MAO; Tao JIANG

    2016-01-01

    To provide ubiquitous Internet access under the explosive increase of applications and data traffic, the current network architecture has become highly heterogeneous and complex, making network management a challenging task. To this end, software-defi ned networking (SDN) has been proposed as a promising solution. In the SDN architecture, the control plane and the data plane are decoupled, and the network infrastructures are abstracted and managed by a centralized controller. With SDN, efficient and fl exible network control can be achieved, which potentially enhances network performance. To harvest the benefi ts of SDN in wireless networks, the software-defi ned wireless network (SDWN) architecture has been recently considered. In this paper, we fi rst analyze the applications of SDN to different types of wireless networks. We then discuss several important technical aspects of performance enhancement in SDN-based wireless networks. Finally, we present possible future research directions of SDWN.

  5. Ninth International Conference on Wireless Communication and Sensor Networks

    CERN Document Server

    Tiwari, Murlidhar; Arora, Anish

    2014-01-01

    Wireless communication and sensor networks would form the backbone to create pervasive and ubiquitous environments that would have profound influence on the society and thus are important to the society. The wireless communication technologies and wireless sensor networks would encompass a wide range of domains such as HW devices such as motes, sensors and associated instrumentation, actuators, transmitters, receivers, antennas, etc., sensor network aspects such as topologies, routing algorithms, integration of heterogeneous network elements and topologies, designing RF devices and systems for energy efficiency and reliability etc. These sensor networks would provide opportunity to continuously and in a distributed manner monitor the environment and generate the necessary warnings and actions. However most of the developments have been demonstrated only in controlled and laboratory environments. So we are yet to see those powerful, ubiquitous applications for the benefit of the society. The conference and con...

  6. WIRELESS AD-HOC NETWORK UNDER BLACK-HOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Shree Om

    2011-01-01

    Full Text Available Wireless Ad-hoc Network is a temporary and decentralized type of wireless network. Due to security vulnerabilities in the routing protocol currently, this type of network is unprotected to network layer attacks. Black-hole attack is such a type of attack and is a Denial-of-Service (DoS attack. Due to its nature, the attack makes the source node send all the data packets to a Black-hole node that ends up dropping all the packets. The aim of this paper is to reflect light on the severe effects of a Black-hole attack in a Wireless Ad-hoc network and the drawbacks of the security mechanisms being used for the mitigation of this attack.

  7. Analysis on Ad Hoc Routing Protocols in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    P.N.Renjith

    2012-12-01

    Full Text Available Outlook of wireless communication system marked an extreme transform with the invention of Wireless Sensor Networks (WSN. WSN is a promising technolog y for enabling a variety of applications like environmental monitoring, security and applications that save our lives and assets. In WSN, large numbers of sensor nodes are deployed to sensing and gathering information and forward them to the base station with the help of routing protocol. Routing protocols plays a major role by identifying and maintaining the routes in the network. Competence o f sensor networks relay on the strong and effective routing protocol used. In this paper, we present a simulation based performance evaluation of differen t Ad hoc routing protocols like AODV, DYMO, FSR, LANM AR, RIP and ZRP in Wireless Sensor Networks. Based on the study, the future research areas and k ey challenges for routing protocol in WSN are to optimize network performance for QoS support and en ergy conservation

  8. Multi-objective ant algorithm for wireless sensor network positioning

    International Nuclear Information System (INIS)

    It is impossible to imagine our modern life without telecommunications. Wireless networks are a part of telecommunications. Wireless sensor networks (WSN) consist of spatially distributed sensors, which communicate in wireless way. This network monitors physical or environmental conditions. The objective is the full coverage of the monitoring region and less energy consumption of the network. The most appropriate approach to solve the problem is metaheuristics. In this paper the full coverage of the area is treated as a constrain. The objectives which are optimized are a minimal number of sensors and energy (lifetime) of the network. We apply multi-objective Ant Colony Optimization to solve this important telecommunication problem. We chose MAX-MIN Ant System approach, because it is proven to converge to the global optima

  9. On the Support of Multimedia Applications over Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Chemseddine BEMMOUSSAT

    2013-05-01

    Full Text Available For next generation wireless networks, supporting quality of service (QoS in multimedia application likevideo, streaming and voice over IP is a necessary and critical requirement. Wireless Mesh Networking isenvisioned as a solution for next networks generation and a promising technology for supportingmultimedia application.With decreasing the numbers of mesh clients, QoS will increase automatically. Several research arefocused to improve QoS in Wireless Mesh networks (WMNs, they try to improve a basics algorithm, likerouting protocols or one of example of canal access, but in moments it no sufficient to ensure a robustsolution to transport multimedia application over WMNs.In this paper we propose an efficient routing algorithm for multimedia transmission in the mesh networkand an approach of QoS in the MAC layer for facilitated transport video over the network studied.

  10. Secure Geographic Routing in Ad Hoc and Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zahariadis Theodore

    2010-01-01

    Full Text Available Security in sensor networks is one of the most relevant research topics in resource constrained wireless devices and networks. Several attacks can be suffered in ad hoc and wireless sensor networks (WSN, which are highly susceptible to attacks, due to the limited resources of the nodes. In this paper, we propose innovative and lightweight localization techniques that allow for intrusion identification and isolation schemes and provide accurate location information. This information is used by our routing protocol which additionally incorporates a distributed trust model to prevent several routing attacks to the network. We finally evaluate our algorithms for accurate localization and for secure routing which have been implemented and tested in real ad hoc and wireless sensor networks.

  11. Analysis of distribution uniformity of nodes in wireless sensor networks

    Institute of Scientific and Technical Information of China (English)

    Zhang Zhenjiang

    2007-01-01

    Wireless sensor networks have several special characteristics which make against the network coverage, such as shortage of energy, difficulty with energy supply and so on. In order to prolong the lifetime of wireless sensor networks, it is necessary to balance the whole network load. As the energy consumption is related to the situation of nodes, the distribution uniformity must be considered. In this paper, a new model is proposed to evaluate the nodes distribution uniformity by considering some parameters which include compression discrepancy, sparseness discrepancy, self discrepancy, maximum cavity radius and minimum cavity radius. The simulation results show that the presented model could be helpful for measuring the distribution uniformity of nodes scattered randomly in wireless sensor networks.

  12. Wireless sensor networks for structural health monitoring

    CERN Document Server

    Cao, Jiannong

    2016-01-01

    This brief covers the emerging area of wireless sensor network (WSN)-based structural health monitoring (SHM) systems, and introduces the authors’ WSN-based platform called SenetSHM. It helps the reader differentiate specific requirements of SHM applications from other traditional WSN applications, and demonstrates how these requirements are addressed by using a series of systematic approaches. The brief serves as a practical guide, explaining both the state-of-the-art technologies in domain-specific applications of WSNs, as well as the methodologies used to address the specific requirements for a WSN application. In particular, the brief offers instruction for problem formulation and problem solving based on the authors’ own experiences implementing SenetSHM. Seven concise chapters cover the development of hardware and software design of SenetSHM, as well as in-field experiments conducted while testing the platform. The brief’s exploration of the SenetSHM platform is a valuable feature for civil engine...

  13. Ultra wideband wireless body area networks

    CERN Document Server

    Thotahewa, Kasun Maduranga Silva; Yuce, Mehmet Rasit

    2014-01-01

    This book explores the design of ultra wideband (UWB) technology for wireless body-area networks (WBAN).  The authors describe a novel implementation of WBAN sensor nodes that use UWB for data transmission and narrow band for data reception, enabling low power sensor nodes, with high data rate capability.  The discussion also includes power efficient, medium access control (MAC) protocol design for UWB based WBAN applications and the authors present a MAC protocol in which a guaranteed delivery mechanism is utilized to transfer data with high priority.  Readers will also benefit from this book’s feasibility analysis of the UWB technology for human implant applications through the study of electromagnetic and thermal power absorption of human tissue that is exposed to UWB signals.   • Describes hardware platform development for IR-UWB based WBAN communication; • Discusses power efficient medium access control (MAC) protocol design for IR-UWB based WBAN applications; • Includes feasibility analy...

  14. Target Tracking In Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sunita Gola

    2012-09-01

    Full Text Available The problem being tackled here relates to the problem of target tracking in wireless sensor networks. It is a specific problem in localization. Localization primarily refers to the detection of spatial coordinates of a node or an object. Target tracking deals with finding spatial coordinates of a moving object and being able to track its movements. In the tracking scheme illustrated, sensors are deployed in a triangular fashion in a hexagonal mesh such that the hexagon is divided into a number of equilateral triangles. The technique used for detection is the trilateration technique in which intersection of three circles is used to determine the object location. While the object is being tracked by three sensors, distance to it from a fourth sensor is also being calculated simultaneously. The difference is that closest three sensors detect at a frequency of one second while the fourth sensor detects the object location at twice the frequency. Using the distance information from the fourth sensor and a simple mathematical technique, location of object ispredicted for every half second as well. The key thing to note is that the forth sensor node is not used for detection but only for estimation of the object at half second intervals and hence does not utilize much power. Using this technique, tracking capability of the system is increased.

  15. Geographic wormhole detection in wireless sensor networks.

    Science.gov (United States)

    Sookhak, Mehdi; Akhundzada, Adnan; Sookhak, Alireza; Eslaminejad, Mohammadreza; Gani, Abdullah; Khurram Khan, Muhammad; Li, Xiong; Wang, Xiaomin

    2015-01-01

    Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly susceptible to a number of security attacks. Denial of Service (DoS) attack is considered the most dominant and a major threat to WSNs. Moreover, the wormhole attack represents one of the potential forms of the Denial of Service (DoS) attack. Besides, crafting the wormhole attack is comparatively simple; though, its detection is nontrivial. On the contrary, the extant wormhole defense methods need both specialized hardware and strong assumptions to defend against static and dynamic wormhole attack. The ensuing paper introduces a novel scheme to detect wormhole attacks in a geographic routing protocol (DWGRP). The main contribution of this paper is to detect malicious nodes and select the best and the most reliable neighbors based on pairwise key pre-distribution technique and the beacon packet. Moreover, this novel technique is not subject to any specific assumption, requirement, or specialized hardware, such as a precise synchronized clock. The proposed detection method is validated by comparisons with several related techniques in the literature, such as Received Signal Strength (RSS), Authentication of Nodes Scheme (ANS), Wormhole Detection uses Hound Packet (WHOP), and Wormhole Detection with Neighborhood Information (WDI) using the NS-2 simulator. The analysis of the simulations shows promising results with low False Detection Rate (FDR) in the geographic routing protocols. PMID:25602616

  16. Geographic wormhole detection in wireless sensor networks.

    Directory of Open Access Journals (Sweden)

    Mehdi Sookhak

    Full Text Available Wireless sensor networks (WSNs are ubiquitous and pervasive, and therefore; highly susceptible to a number of security attacks. Denial of Service (DoS attack is considered the most dominant and a major threat to WSNs. Moreover, the wormhole attack represents one of the potential forms of the Denial of Service (DoS attack. Besides, crafting the wormhole attack is comparatively simple; though, its detection is nontrivial. On the contrary, the extant wormhole defense methods need both specialized hardware and strong assumptions to defend against static and dynamic wormhole attack. The ensuing paper introduces a novel scheme to detect wormhole attacks in a geographic routing protocol (DWGRP. The main contribution of this paper is to detect malicious nodes and select the best and the most reliable neighbors based on pairwise key pre-distribution technique and the beacon packet. Moreover, this novel technique is not subject to any specific assumption, requirement, or specialized hardware, such as a precise synchronized clock. The proposed detection method is validated by comparisons with several related techniques in the literature, such as Received Signal Strength (RSS, Authentication of Nodes Scheme (ANS, Wormhole Detection uses Hound Packet (WHOP, and Wormhole Detection with Neighborhood Information (WDI using the NS-2 simulator. The analysis of the simulations shows promising results with low False Detection Rate (FDR in the geographic routing protocols.

  17. Middleware for Wireless Sensor Networks: A Survey

    Institute of Scientific and Technical Information of China (English)

    Miao-Miao Wang; Jian-Nong Cao; Jing Li; Sajal K. Dasi

    2008-01-01

    Wireless Sensor Networks (WSNs) have found more and more applications in a variety of pervasive computing environments. However, how to support the development, maintenance, deployment and execution of applications over WSNs remains to be a nontrivial and challenging task, mainly because of the gap between the high level requirements from pervasive computing applications and the underlying operation of WSNs. Middleware for WSN can help bridge the gap and remove impediments. In recent years, research has been carried out on WSN middleware from different aspects and for different purposes. In this paper, we provide a comprehensive review of the existing work on WSN middleware, seeking for a better understanding of the current issues and future directions in this field. We propose a reference framework to analyze the functionalities of WSN middleware in terms of the system abstractions and the services provided. We review the approaches and techniques for implementing the services. On the basis of the analysis and by using a feature tree, weprovide taxonomy of the features of WSN middleware and their relationships, and use the taxonomy to classify and evaluate existing work. We also discuss open problems in this important area of research.

  18. Green Modulation in Proactive Wireless Sensor Networks

    CERN Document Server

    Abouei, Jamshid; Pasupathy, Subbarayan

    2009-01-01

    Due to unique characteristics of sensor nodes, choosing energy-efficient modulation scheme with low-complexity implementation (refereed to as green modulation) is a critical factor in the physical layer of Wireless Sensor Networks (WSNs). This paper presents (to the best of our knowledge) the first in-depth analysis of energy efficiency of various modulation schemes using realistic models in IEEE 802.15.4 standard and present state-of-the art technology, to find the best scheme in a proactive WSN over Rayleigh and Rician flat-fading channel models with path-loss. For this purpose, we describe the system model according to a pre-determined time-based process in practical sensor nodes. The present analysis also includes the effect of bandwidth and active mode duration on energy efficiency of popular modulation designs in the pass-band and Ultra-WideBand (UWB) categories. Experimental results show that among various pass-band and UWB modulation schemes, Non-Coherent M-ary Frequency Shift Keying (NC-MFSK) with sm...

  19. Industrial wireless networking with resource constraint devices

    NARCIS (Netherlands)

    Das, Kallol

    2015-01-01

    During the last decade, wireless technologies have revolutionized the industrial automation sector by enabling wireless sensing and actuation for industrial applications. Most of these recently developed industrial standards are built on top of IEEE802.15.4 interface, which uses 2.4GHz frequency ban

  20. 3G POWER GRID SYSTEM

    OpenAIRE

    Saiyad Tausif Ali *; Gaurav Pawar; Pragati Rathi; Mandar Pathak

    2016-01-01

    3G Power grid system is dual side stream of electricity and automated construct information and distributed advanced energy delivery network. In this 3G Power grid system avoided the thermal and hydro sources of energy. By using the solar power and wind power energy will generate electricity according with the condition of nature. 3G Power grid system provides the facility of generating as well as marketing of electricity not only for the producers but also for consumers. By using megabytes o...