WorldWideScience

Sample records for cooperative wireless networks

  1. Coalitions in Cooperative Wireless Networks

    CERN Document Server

    Mathur, Suhas; Mandayam, Narayan B

    2008-01-01

    Cooperation between rational users in wireless networks is studied using coalitional game theory. Using the rate achieved by a user as its utility, it is shown that the stable coalition structure, i.e., set of coalitions from which users have no incentives to defect, depends on the manner in which the rate gains are apportioned among the cooperating users. Specifically, the stability of the grand coalition (GC), i.e., the coalition of all users, is studied. Transmitter and receiver cooperation in an interference channel (IC) are studied as illustrative cooperative models to determine the stable coalitions for both flexible (transferable) and fixed (non-transferable) apportioning schemes. It is shown that the stable sum-rate optimal coalition when only receivers cooperate by jointly decoding (transferable) is the GC. The stability of the GC depends on the detector when receivers cooperate using linear multiuser detectors (non-transferable). Transmitter cooperation is studied assuming that all receivers coopera...

  2. Novel Concepts of Cooperative Wireless Networking

    DEFF Research Database (Denmark)

    Zhang, Qi

    2008-01-01

    ; secondly, the increasing density of the wireless devices makes cooperation possible; last, the cost of information exchange (i.e. transmission power, transmission time, spectrum, etc.) is very low if information exchange over short-range link is needed. Cooperation changes the way of information delivery...... for a cognitive radio MAC protocol. Finally, a novel modulation, hierarchical modulation, is used to facilitate the uplink transmission in cooperative networks. Simulation and analytical analysis has been conducted. Great potentials of cooperation are shown in improving the energy effciency, spectrum effciency......Although wireless networks have achieved great success in the lastest two decades, the current wireless networks have difficulties to fulll users' ever-increasing expectations and needs. It is mainly due to available spectrum resource scarcity, limited battery capacity of wireless device...

  3. Censored cooperative positioning for dense wireless networks

    NARCIS (Netherlands)

    Das, Kallol; Wymeersch, Henk

    Cooperative positioning is an emerging topic in wireless sensor networks and navigation. It can improve the positioning accuracy and coverage in GPS-challenged conditions such as inside tunnels, in urban canyons, and indoors. Different algorithms have been proposed relying on iteratively exchanging

  4. Cooperative networking in a heterogeneous wireless medium

    CERN Document Server

    Ismail, Muhammad

    2013-01-01

    This brief focuses on radio resource allocation in a heterogeneous wireless medium. It presents radio resource allocation algorithms with decentralized implementation, which support both single-network and multi-homing services. The brief provides a set of cooperative networking algorithms, which rely on the concepts of short-term call traffic load prediction, network cooperation, convex optimization, and decomposition theory. In the proposed solutions, mobile terminals play an active role in the resource allocation operation, instead of their traditional role as passive service recipients in the networking environment.

  5. Cooperative Jamming for Physical Layer Security in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee

    2012-01-01

    Interference is generally considered as the redundant and unwanted occurrence in wireless communication. This work proposes a novel cooperative jamming mechanism for scalable networks like Wireless Sensor Networks (WSNs) which makes use of friendly interference to confuse the eavesdropper...

  6. Energy Aware Computing in Cooperative Wireless Networks

    DEFF Research Database (Denmark)

    Olsen, Anders Brødløs; Fitzek, Frank H. P.; Koch, Peter

    2005-01-01

    In this work the idea of cooperation is applied to wireless communication systems. It is generally accepted that energy consumption is a significant design constraint for mobile handheld systems. We propose a novel method of cooperative task computing by distributing tasks among terminals over...... the unreliable wireless link. Principles of multi–processor energy aware task scheduling are used exploiting performance scalable technologies such as Dynamic Voltage Scaling (DVS). We introduce a novel mechanism referred to as D2VS and here it is shown by means of simulation that savings of 40% can be achieved....

  7. Cooperative Jamming for Physical Layer Security in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee

    2012-01-01

    Interference is generally considered as the redundant and unwanted occurrence in wireless communication. This work proposes a novel cooperative jamming mechanism for scalable networks like Wireless Sensor Networks (WSNs) which makes use of friendly interference to confuse the eavesdropper...... work as cooperative jamming sources to increase the equivocation of the eavesdropper. In this work, eavesdropper’s equivocation is compared with the main channel in terms of mutual information and secrecy capacity....

  8. Protocol design and analysis for cooperative wireless networks

    CERN Document Server

    Song, Wei; Jin, A-Long

    2017-01-01

    This book focuses on the design and analysis of protocols for cooperative wireless networks, especially at the medium access control (MAC) layer and for crosslayer design between the MAC layer and the physical layer. It highlights two main points that are often neglected in other books: energy-efficiency and spatial random distribution of wireless devices. Effective methods in stochastic geometry for the design and analysis of wireless networks are also explored. After providing a comprehensive review of existing studies in the literature, the authors point out the challenges that are worth further investigation. Then, they introduce several novel solutions for cooperative wireless network protocols that reduce energy consumption and address spatial random distribution of wireless nodes. For each solution, the book offers a clear system model and problem formulation, details of the proposed cooperative schemes, comprehensive performance analysis, and extensive numerical and simulation results that validate th...

  9. Multiuser Cooperation with Hybrid Network Coding in Wireless Networks

    Directory of Open Access Journals (Sweden)

    G. Wang

    2014-04-01

    Full Text Available In this paper a hybrid Network Coding Cooperation (hybrid-NCC system is proposed to achieve both reliable transmission and high throughput in wireless networks. To balance the transmission reliability with throughput, the users are divided into cooperative sub-networks based on the geographical information, and the cooperation is implemented in each sub-network. After receiving signals from the cooperative partners, each user encodes them by exploiting hybrid network coding and then forwards the recoded symbols via the Link-Adaptive Regenerative (LAR relaying. First, the Diversity-Multiplexing Tradeoff (DMT is analyzed to demonstrate that the proposed system is bandwidth-efficient. Second, the Symbol Error Probability (SEP is also derived, which shows that the proposed system achieves a higher reliability as compared to the traditional Complex Field Network Coding Cooperation (CFNCC. Moreover, because dedicated relays are not required, our proposed system can both reduce the costs and enhance the flexibility of the implementation. Finally, the analytical results are supported and validated by numerical simulations.

  10. DSTC Layering Protocols in Wireless Cooperative Networks

    CERN Document Server

    Elamvazhuthi, P S; Dey, B K

    2008-01-01

    In adhoc wireless relay networks, layers of relays are used to communicate from a source to a destination to achieve better reliability. In this paper, we consider five protocols derived from an earlier proposed protocol, where the relays do a simple processing before transmitting and as a result achieve distributed space-time code. Four of the protocols discussed utilize more complicated relaying schemes than simple layered protocols proposed in earlier literature. We have analyzed the effectiveness of these protocols in various power loss configurations among the paths. Optimum power allocation of the total power among various transmissions have been found by reasonable fine search for all the protocols. Bit error rate plots are compared under optimum power allocation for these protocols. From the simulation results, we draw some guidelines as to which protocol is good for what kind of environment.

  11. Cooperative distributed target tracking algorithm in mobile wireless sensor networks

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    The paper proposes a cooperative distributed target tracking algorithm in mobile wireless sensor networks.There are two main components in the algorithm:distributed sensor-target assignment and sensor motion control.In the key idea of the sensor-target assignment,sensors are considered as autonomous agents and the defined objective function of each sensor concentrates on two fundamental factors:the tracking accuracy and the tracking cost.Compared with the centralized algorithm and the noncooperative distrib...

  12. Cooperative wireless communications

    CERN Document Server

    Zhang, Yan

    2009-01-01

    Cooperative devices and mechanisms are increasingly important to enhance the performance of wireless communications and networks, with their ability to decrease power consumption and packet loss rate and increase system capacity, computation, and network resilience. Considering the wide range of applications, strategies, and benefits associated with cooperative wireless communications, researchers and product developers need a succinct understanding of relevant theory, fundamentals, and techniques to navigate this challenging field. ""Cooperative Wireless Communications"" provides just that. I

  13. POWER CONTROL BASED COOPERATIVE OPPORTUNISTIC ROUTING IN WIRELESS SENSOR NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Hu Haifeng; Zhu Qi

    2009-01-01

    This paper proposes an approach called PC-CORP (Power Control based Cooperative Opportunistic Routing Protocol) for WSN (Wireless Sensor Networks), providing robustness to the random variations in network connectivity while ensuring better data forwarding efficiency in an energy efficient manner. Based on the realistic radio model, we combine the region-based routing, rendezvous scheme, sleep discipline and cooperative communication together to model data forwarding by cross layer design in WSN. At the same time, a lightweight transmission power control algorithm called PC-AIMD (Power Control Additive Increase Multiplicative Decrease) is introduced to utilize the cooperation of relay nodes to improve the forwarding efficiency performance and increase the robustness of the routing protocol. In the simulation, the performance of PC-COPR is investigated in terms of the adaptation of variations in network connectivity and satisfying the QoS requirements of application.

  14. Cooperative Routing for Wireless Networks using Mutual-Information Accumulation

    CERN Document Server

    Draper, Stark C; Molisch, Andreas F; Yedidia, Jonathan S

    2009-01-01

    Cooperation between the nodes of wireless multihop networks can increase communication reliability, reduce energy consumption, and decrease latency. The possible improvements are even greater when nodes perform mutual information accumulation using rateless codes. In this paper, we investigate routing problems in such networks. Given a network, a source, and a destination, our objective is to minimize end-to-end transmission delay under energy and bandwidth constraints. We provide an algorithm that determines which nodes should participate in forwarding the message and what resources (time, energy, bandwidth) should be allocated to each. Our approach factors into two sub-problems, each of which can be solved efficiently. For any transmission order we show that solving for the optimum resource allocation can be formulated as a linear programming problem. We then show that the transmission order can be improved systematically by swapping nodes based on the solution of the linear program. Solving a sequence of l...

  15. Cooperative Opportunistic Pressure Based Routing for Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nadeem Javaid

    2017-03-01

    Full Text Available In this paper, three opportunistic pressure based routing techniques for underwater wireless sensor networks (UWSNs are proposed. The first one is the cooperative opportunistic pressure based routing protocol (Co-Hydrocast, second technique is the improved Hydrocast (improved-Hydrocast, and third one is the cooperative improved Hydrocast (Co-improved Hydrocast. In order to minimize lengthy routing paths between the source and the destination and to avoid void holes at the sparse networks, sensor nodes are deployed at different strategic locations. The deployment of sensor nodes at strategic locations assure the maximum monitoring of the network field. To conserve the energy consumption and minimize the number of hops, greedy algorithm is used to transmit data packets from the source to the destination. Moreover, the opportunistic routing is also exploited to avoid void regions by making backward transmissions to find reliable path towards the destination in the network. The relay cooperation mechanism is used for reliable data packet delivery, when signal to noise ratio (SNR of the received signal is not within the predefined threshold then the maximal ratio combining (MRC is used as a diversity technique to improve the SNR of the received signals at the destination. Extensive simulations validate that our schemes perform better in terms of packet delivery ratio and energy consumption than the existing technique; Hydrocast.

  16. Cooperative Opportunistic Pressure Based Routing for Underwater Wireless Sensor Networks.

    Science.gov (United States)

    Javaid, Nadeem; Muhammad; Sher, Arshad; Abdul, Wadood; Niaz, Iftikhar Azim; Almogren, Ahmad; Alamri, Atif

    2017-03-19

    In this paper, three opportunistic pressure based routing techniques for underwater wireless sensor networks (UWSNs) are proposed. The first one is the cooperative opportunistic pressure based routing protocol (Co-Hydrocast), second technique is the improved Hydrocast (improved-Hydrocast), and third one is the cooperative improved Hydrocast (Co-improved Hydrocast). In order to minimize lengthy routing paths between the source and the destination and to avoid void holes at the sparse networks, sensor nodes are deployed at different strategic locations. The deployment of sensor nodes at strategic locations assure the maximum monitoring of the network field. To conserve the energy consumption and minimize the number of hops, greedy algorithm is used to transmit data packets from the source to the destination. Moreover, the opportunistic routing is also exploited to avoid void regions by making backward transmissions to find reliable path towards the destination in the network. The relay cooperation mechanism is used for reliable data packet delivery, when signal to noise ratio (SNR) of the received signal is not within the predefined threshold then the maximal ratio combining (MRC) is used as a diversity technique to improve the SNR of the received signals at the destination. Extensive simulations validate that our schemes perform better in terms of packet delivery ratio and energy consumption than the existing technique; Hydrocast.

  17. Application and Implementation of Network Coding for Cooperative Wireless Networks

    DEFF Research Database (Denmark)

    Pedersen, Morten Videbæk

    2012-01-01

    network coding, which from a theoretical point of view has the potential to make our networks faster, energy-efficient, robust and more secure. In this PhD I provide an experimental platform for network coding in order to evaluate whether these theoretical merits may be transferred to practice. I provide......Today the traditional client-server network architecture is the predominant model in our network infrastructure. However, for the increasing amount of \\live" services such as TV and radio being digitalized and the growing amount of user generated content, the centralized model can provide a poor...... utilization of the available network resources. To efficiently support these services we look towards the field of user cooperation. In order to create the incentive for users to join the cooperation we must make the gain larger than the expense. In this PhD I have suggested two central ways of achieving this...

  18. Opportunistic Cooperative Reliable Transmission Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hua Guo

    2014-04-01

    Full Text Available The high reliability requirement of data transmission in wireless sensor networks has been a large challenge due to the random mobility and network topoloy instability, as well as restriction of energy consumption and system life time. In this work, the relationship matirx of distance and speed was created at first. Then the binay tree of mobility and reliabiliy was proposed based on the distance relationship matrix. The optimal relay nodes with high reliabiliy were selected by seeking the binay tree. The high reliable opportunistic cooperative data transmission scheme was presnted finally. The outcome of both mathematical analysis and NS simulation indicate that the proposed mechanism is superior to the traditional data transmission mechnism such as the reliability, system throughput and energy efficiency and so on.

  19. Investigation of Cooperation Technologies in Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Zhuo Sun

    2010-01-01

    Full Text Available Heterogeneous wireless networks based on varieties of radio access technologies (RATs and standards will coexist in the future. In order to exploit this potential multiaccess gain, it is required that different RATs are managed in a cooperative fashion. This paper proposes two advanced functional architecture supporting the functionalities of interworking between WiMAX and 3GPP networks as a specific case: Radio Control Server- (RCS- and Access Point- (AP- based centralized architectures. The key technologies supporting the interworking are then investigated, including proposing the Generic Link Layer (GLL and researching the multiradio resource management (MRRM mechanisms. This paper elaborates on these topics, and the corresponding solutions are proposed with preliminary results.

  20. Coded Cooperation for Multiway Relaying in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhongwei Si

    2015-06-01

    Full Text Available Wireless sensor networks have been considered as an enabling technology for constructing smart cities. One important feature of wireless sensor networks is that the sensor nodes collaborate in some manner for communications. In this manuscript, we focus on the model of multiway relaying with full data exchange where each user wants to transmit and receive data to and from all other users in the network. We derive the capacity region for this specific model and propose a coding strategy through coset encoding. To obtain good performance with practical codes, we choose spatially-coupled LDPC (SC-LDPC codes for the coded cooperation. In particular, for the message broadcasting from the relay, we construct multi-edge-type (MET SC-LDPC codes by repeatedly applying coset encoding. Due to the capacity-achieving property of the SC-LDPC codes, we prove that the capacity region can theoretically be achieved by the proposed MET SC-LDPC codes. Numerical results with finite node degrees are provided, which show that the achievable rates approach the boundary of the capacity region in both binary erasure channels and additive white Gaussian channels.

  1. Coded Cooperation for Multiway Relaying in Wireless Sensor Networks.

    Science.gov (United States)

    Si, Zhongwei; Ma, Junyang; Thobaben, Ragnar

    2015-06-29

    Wireless sensor networks have been considered as an enabling technology for constructing smart cities. One important feature of wireless sensor networks is that the sensor nodes collaborate in some manner for communications. In this manuscript, we focus on the model of multiway relaying with full data exchange where each user wants to transmit and receive data to and from all other users in the network. We derive the capacity region for this specific model and propose a coding strategy through coset encoding. To obtain good performance with practical codes, we choose spatially-coupled LDPC (SC-LDPC) codes for the coded cooperation. In particular, for the message broadcasting from the relay, we construct multi-edge-type (MET) SC-LDPC codes by repeatedly applying coset encoding. Due to the capacity-achieving property of the SC-LDPC codes, we prove that the capacity region can theoretically be achieved by the proposed MET SC-LDPC codes. Numerical results with finite node degrees are provided, which show that the achievable rates approach the boundary of the capacity region in both binary erasure channels and additive white Gaussian channels.

  2. Conceptual Considerations for Reducing the Computational Complexity in Software Defined Radio using Cooperative Wireless Networks

    DEFF Research Database (Denmark)

    Kristensen, Jesper Michael; Fitzek, Frank H. P.; Koch, Peter

    2005-01-01

    This paper motivates the application of Software defined radio as the enabling technology in the implementation of future wireless terminals for 4G. It outlines the advantages and disadvantages of SDR in terms of Flexibility and reconfigurability versus computational complexity. To mitigate...... the expected increase in complexity leading to a decrease in energy efficiency, cooperative wireless networks are introduced. Cooperative wireless networks enables the concept of resource sharing. Resource sharing is interpreted as collaborative signal processing. This interpretation leads to the concept...

  3. Event-triggered cooperative target tracking in wireless sensor networks

    Institute of Scientific and Technical Information of China (English)

    Lu Kelin; Zhou Rui; Li Hao

    2016-01-01

    Since the issues of low communication bandwidth supply and limited battery capacity are very crucial for wireless sensor networks, this paper focuses on the problem of event-triggered cooperative target tracking based on set-membership information filtering. We study some fundamental properties of the set-membership information filter with multiple sensor measure-ments. First, a sufficient condition is derived for the set-membership information filter, under which the boundedness of the outer ellipsoidal approximation set of the estimation means is guaranteed. Second, the equivalence property between the parallel and sequential versions of the set-membership information filter is presented. Finally, the results are applied to a 1D event-triggered target tracking scenario in which the negative information is exploited in the sense that the measurements that do not satisfy the triggering conditions are modelled as set-membership mea-surements. The tracking performance of the proposed method is validated with extensive Monte Carlo simulations.

  4. Event-triggered cooperative target tracking in wireless sensor networks

    Directory of Open Access Journals (Sweden)

    Lu Kelin

    2016-10-01

    Full Text Available Since the issues of low communication bandwidth supply and limited battery capacity are very crucial for wireless sensor networks, this paper focuses on the problem of event-triggered cooperative target tracking based on set-membership information filtering. We study some fundamental properties of the set-membership information filter with multiple sensor measurements. First, a sufficient condition is derived for the set-membership information filter, under which the boundedness of the outer ellipsoidal approximation set of the estimation means is guaranteed. Second, the equivalence property between the parallel and sequential versions of the set-membership information filter is presented. Finally, the results are applied to a 1D event-triggered target tracking scenario in which the negative information is exploited in the sense that the measurements that do not satisfy the triggering conditions are modelled as set-membership measurements. The tracking performance of the proposed method is validated with extensive Monte Carlo simulations.

  5. Cooperation in wireless networks principles and applications : real egoistic behavior is to cooperate!

    CERN Document Server

    Fitzek, Frank HP

    2006-01-01

    Covers the underlying principles of cooperative techniques as well as several applications demonstrating the use of such techniques in practical systems. This book also summarizes the strength of cooperation for wireless communication systems, motivating the use of cooperative techniques.

  6. Design implementation and analysis of wireless model based predictive networked control system over cooperative wireless network

    OpenAIRE

    Ulusoy, Mehmet Alphan

    2009-01-01

    Owing to their distributed architecture, networked control systems are proven to be feasible in scenarios where a spatially distributed control system is required. Traditionally, such networked control systems operate over real-time wired networks over which sensors, controllers and actuators interact with each other. Recently, in order to achieve the utmost flexibility, scalability, ease of deployment and maintainability, wireless networks such as IEEE 802.11 LANs are being preferred over d...

  7. Network-Level Cooperative Protocols for Wireless Multicasting: Stable Throughput Analysis and Use of Network Coding

    CERN Document Server

    Fanous, Anthony

    2010-01-01

    In this paper, we investigate the impact of network coding at the relay node on the stable throughput rate in multicasting cooperative wireless networks. The proposed protocol adopts Network-level cooperation in contrast to the traditional physical layer cooperative protocols and in addition uses random linear network coding at the relay node. The traffic is assumed to be bursty and the relay node forwards its packets during the periods of source silence which allows better utilization for channel resources. Our results show that cooperation will lead to higher stable throughput rates than conventional retransmission policies and that the use of random linear network coding at the relay can further increase the stable throughput with increasing Network Coding field size or number of packets over which encoding is performed.

  8. Low complexity detectors for cooperative wireless sensor networks

    KAUST Repository

    Ahmed, Qasim Zeeshan

    2012-09-01

    This paper investigates and compares the performance of wireless sensor networks (WSN) when sensors operate on the principles of cooperative communications. We consider a scenario where the source transmits signals to the destination with the help of L sensors. As the destination has the capacity of processing only U out of these L signals, U strongest signals are selected while the remaining (L - U) signals are suppressed. A preprocessing block similar to channel-shortening (CS) is proposed in this contribution. However, this preprocessing block employs rank-reduction technique instead of CS. This detector operates on the principles of principal components (PC). From our simulations it can be observed that this detector is capable of achieving a similar bit error rate (BER) performance as the full-rank MMSE detector with significantly lower complexity. It outperforms the CS-based detector in terms of BER performance when using fixed amplification factor. However, for variable gain amplification factor a tradeoff between the diversity gain and the receiver complexity can be observed. From the simulations it can be concluded that the BER performance of the PC-based detector when using variable gain amplification factor are better than that of the CS-based detector for lower signal to noise ratio. © 2012 IEEE.

  9. Energy Efficient Four Level Cooperative Opportunistic Communication for Wireless Personal Area Networks (WPAN)

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Inamdar, Sandeep; Prasad, Neeli R.;

    2013-01-01

    For wireless sensor networks (WSN),energy is a scarce resource. Due to limited battery resources, the energy consumption is the critical issue for the transmission as well as reception of the signals in the wireless communication. WSNs are infrastructure-less shared network demanding more energy...... consumption due to collaborative transmissions. This paper proposes a new cooperative opportunistic four level model for IEEE 802.15.4 Wireless Personal Area Network (WPAN).The average per node energy consumption is observed merely about 0.17mJ for the cooperative wireless communication which proves...... the proposed mechanism to be energy efficient. This paper further proposes four levels of cooperative data transmission from source to destination to improve network coverage with energy efficiency....

  10. Censoring for Bayesian Cooperative Positioning in Dense Wireless Networks

    NARCIS (Netherlands)

    Das, Kallol; Wymeersch, Henk

    2012-01-01

    Cooperative positioning is a promising solution for location-enabled technologies in GPS-challenged environments. However, it suffers from high computational complexity and increased network traffic, compared to traditional positioning approaches. The computational complexity is related to the numbe

  11. Cooperative file sharing mechanism with Network Coding in wireless Mesh networks

    Institute of Scientific and Technical Information of China (English)

    KIMBA DIT ADAMOU Boubacar; ZOU Shi-hong; ABDOU Saley; MA Yi-hui; CHENG Shi-duan

    2009-01-01

    This article describes a new model of a cooperative file sharing system in a wireless Mesh network. The authors' approach is to develop an efficient and cooperative file sharing mechanism based on opportunistic random linear Network Coding. Within this mechanism, every node transmits random linear combination of its packets according to cooperative priority, which is computed in a distributed manner according to the node-possible contribution to its neighbor nodes. With this mechanism, the more a node contributes to others, the more the node has chances to recover the entire file first. The performance metrics of interest here are: the delay until all the packets in a file have been delivered to all nodes, and an ideal packet size, by the use of which the authors can get the minimum transmission delay. Through extensive simulation the authors compare their mechanism with the current transmission process in a wireless Mesh network without random linear Network Coding. The authors found that using their mechanism, the nodes can cooperatively share the entire file with less transmission time and delay than the current transmission process without random linear network.

  12. Bio-Inspired Energy-Aware Protocol Design for Cooperative Wireless Networks

    DEFF Research Database (Denmark)

    Perrucci, Gian Paolo; Anggraeni, Puri Novelti; Wardana, Satya Ardhy;

    2011-01-01

    In this work, bio-inspired cooperation rules are applied to wireless communication networks. The main goal is to derive cooperative behaviour rules to improve the energy consumption of each mobile device. A medium access control (MAC) protocol particularly designed for peer-to-peer communication ...

  13. Diversity, Coding, and Multiplexing Trade-Off of Network-Coded Cooperative Wireless Networks

    CERN Document Server

    Iezzi, Michela; Graziosi, Fabio

    2012-01-01

    In this paper, we study the performance of network-coded cooperative diversity systems with practical communication constraints. More specifically, we investigate the interplay between diversity, coding, and multiplexing gain when the relay nodes do not act as dedicated repeaters, which only forward data packets transmitted by the sources, but they attempt to pursue their own interest by forwarding packets which contain a network-coded version of received and their own data. We provide a very accurate analysis of the Average Bit Error Probability (ABEP) for two network topologies with three and four nodes, when practical communication constraints, i.e., erroneous decoding at the relays and fading over all the wireless links, are taken into account. Furthermore, diversity and coding gain are studied, and advantages and disadvantages of cooperation and binary Network Coding (NC) are highlighted. Our results show that the throughput increase introduced by NC is offset by a loss of diversity and coding gain. It i...

  14. Bio-Inspired Energy-Aware Protocol Design for Cooperative Wireless Networks

    DEFF Research Database (Denmark)

    Perrucci, Gian Paolo; Anggraeni, Puri Novelti; Wardana, Satya Ardhy

    2011-01-01

    In this work, bio-inspired cooperation rules are applied to wireless communication networks. The main goal is to derive cooperative behaviour rules to improve the energy consumption of each mobile device. A medium access control (MAC) protocol particularly designed for peer-to-peer communication...... among cooperative wireless mobile devices is described. The work is based on a novel communication architecture, where a group of mobile devices are connected both to a cellular base station and among them using short-range communication links. A prior work has investigated the energy saving that can...

  15. Adaptive Cooperative FEC Based on Combination of Network Coding and Channel Coding for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yong Jin

    2014-02-01

    Full Text Available The data delivery over wireless links with QoS-guarantee is a big challenge because of the unreliable and dynamic characteristics of wireless sensor networks, as well as QoS diversity requirements of applications. In this paper, we propose an adaptive cooperative Forward Error Correction algorithm based on network coding, in the hope quality of experience could be satisfied on receivers with high quality. The algorithm, based on wireless link and distance, adjusts the RS coder parameter and selects the optimal relay nodes. On the other hand, we combine the channel coding and network coding technology at the data link layer to fulfil the requirements of QoS diversity. Both mathematical analysis and NS simulation results demonstrate the proposed mechanism is superior to the traditional FEC and cooperative FEC alone at the reliability, real time performance and energy efficiency. In addition, the proposed mechanism can significantly improve quality of media streaming, in terms of playable frame rate on the receiving side. 

  16. Locomotion trajectory with cooperative metrics in wireless sensor networks

    Institute of Scientific and Technical Information of China (English)

    QIN Ning-ning; ZHANG Lin; SHAN Xiu-ming; XU Bao-guo

    2007-01-01

    Detection coverage control is one of the most important topics in the intrusion detection problem of wireless sensor networks (WSN). However, its converse, i.e., to design an object locomotion trajectory in WSN, has not received enough attention. This article proposes a heuristic algorithm, namely, the security & speed (SS) algorithm, to depict such a trajectory that takes into consideration both security and speed. The merit of the SS algorithm is its topology independency. When compared with traditional algorithms, the SS algorithm approaches the optimal trajectory better, and enjoys considerably lower computational load, and a better and adjustable tradeoff between trajectory security and speed.

  17. One4All Cooperative Media Access Strategy in Infrastructure Based Distributed Wireless Networks

    DEFF Research Database (Denmark)

    Zhang, Qi; Fitzek, Frank H.P.; Iversen, Villy Bæk

    2008-01-01

    In this paper we propose the one4all cooperative access strategy to introduce a more efficient media access strategy for wireless networks. The one4all scheme is designed for the infrastructure based distributed wireless network architecture. The basic idea is that mobile devices can form...... a cooperative cluster using their short-range air interface and one device contends the channel for all the devices within the cluster. This strategy reduces the number of mobile devices involved in the collision process for the wireless medium resulting in larger throughput, smaller access delay, and less...... energy consumption. Based on an analytical model, the proposed strategy is compared with the two existing strategies RTS/CTS (request to send/ clear to send) and packet aggregation. The results show that the proposed cooperative scheme has similar throughput performance as packet aggregation and it has...

  18. Network coding and evolutionary theory for performance enhancement in wireless cooperative clusters

    DEFF Research Database (Denmark)

    Militano, Leonardo; Fitzek, Frank; Iera, Antonio;

    2010-01-01

    consumption, data rate and data transfer time are parameters that will likely benefit from this novel communication concept. This paper presents a WLAN-based cooperative scenario, conceived to support file-sharing services, in which a sub-set of cluster nodes access, through their cellular radio interface......Cooperation over short-range wireless links among user devices, which download remote contents through cellular links, is a paradigm quickly gaining ground, given that it can answer several technological and design issues that next-generation wireless applications will raise. Among others, energy......, portions of a file to be successively exchanged among all cluster members over wireless local area network (WLAN) links. Besides showing the beneficial effects of cooperation, this paper also focuses on the performance enhancement that can be achieved when using the network coding paradigm, whose...

  19. Weighted cooperative routing for wireless mobile Ad-hoc network

    Institute of Scientific and Technical Information of China (English)

    ZHAO Xian-jing; ZHENG Bao-yu; CHEN Chao

    2007-01-01

    A novel weighted cooperative routing algorithm (WCRA) is proposed in this article, which was on the basis of a weighted metric with maximal remaining energy (MRE) of the relays and the maximal received SNR (MRS) of the nodes.Moreover, a cooperative routing protocol was implemented on the basis of WCRA. Then simulation is done on network simulation (NS-2) platform to compare the performances of MRS, MRE and WCRA with that of noncooperative destination-sequenced destination-sequenced distance-vector (DSDV) protocol. The simulative results show that WCRA obtains a performance tradeoff between MRE and MRS in terms of delivery ratio and network lifetime, which can effectively improve the network lifetime at an acceptable loss of delivery ratio.

  20. General Auction-Theoretic Strategies for Distributed Partner Selection in Cooperative Wireless Networks

    CERN Document Server

    Mukherjee, Amitav

    2010-01-01

    It is unrealistic to assume that all nodes in an ad hoc wireless network would be willing to participate in cooperative communication, especially if their desired Quality-of- Service (QoS) is achievable via direct transmission. An incentivebased auction mechanism is presented to induce cooperative behavior in wireless networks with emphasis on users with asymmetrical channel fading conditions. A single-object secondprice auction is studied for cooperative partner selection in singlecarrier networks. In addition, a multiple-object bundled auction is analyzed for the selection of multiple simultaneous partners in a cooperative orthogonal frequency-division multiplexing (OFDM) setting. For both cases, we characterize equilibrium outage probability performance, seller revenue, and feedback bounds. The auction-based partner selection allows winning bidders to achieve their desired QoS while compensating the seller who assists them. At the local level sellers aim for revenue maximization, while connections are draw...

  1. Cooperative Game-Based Energy Efficiency Management over Ultra-Dense Wireless Cellular Networks

    Directory of Open Access Journals (Sweden)

    Ming Li

    2016-09-01

    Full Text Available Ultra-dense wireless cellular networks have been envisioned as a promising technique for handling the explosive increase of wireless traffic volume. With the extensive deployment of small cells in wireless cellular networks, the network spectral efficiency (SE is improved with the use of limited frequency. However, the mutual inter-tier and intra-tier interference between or among small cells and macro cells becomes serious. On the other hand, more chances for potential cooperation among different cells are introduced. Energy efficiency (EE has become one of the most important problems for future wireless networks. This paper proposes a cooperative bargaining game-based method for comprehensive EE management in an ultra-dense wireless cellular network, which highlights the complicated interference influence on energy-saving challenges and the power-coordination process among small cells and macro cells. Especially, a unified EE utility with the consideration of the interference mitigation is proposed to jointly address the SE, the deployment efficiency (DE, and the EE. In particular, closed-form power-coordination solutions for the optimal EE are derived to show the convergence property of the algorithm. Moreover, a simplified algorithm is presented to reduce the complexity of the signaling overhead, which is significant for ultra-dense small cells. Finally, numerical simulations are provided to illustrate the efficiency of the proposed cooperative bargaining game-based and simplified schemes.

  2. Cooperative Game-Based Energy Efficiency Management over Ultra-Dense Wireless Cellular Networks.

    Science.gov (United States)

    Li, Ming; Chen, Pengpeng; Gao, Shouwan

    2016-09-13

    Ultra-dense wireless cellular networks have been envisioned as a promising technique for handling the explosive increase of wireless traffic volume. With the extensive deployment of small cells in wireless cellular networks, the network spectral efficiency (SE) is improved with the use of limited frequency. However, the mutual inter-tier and intra-tier interference between or among small cells and macro cells becomes serious. On the other hand, more chances for potential cooperation among different cells are introduced. Energy efficiency (EE) has become one of the most important problems for future wireless networks. This paper proposes a cooperative bargaining game-based method for comprehensive EE management in an ultra-dense wireless cellular network, which highlights the complicated interference influence on energy-saving challenges and the power-coordination process among small cells and macro cells. Especially, a unified EE utility with the consideration of the interference mitigation is proposed to jointly address the SE, the deployment efficiency (DE), and the EE. In particular, closed-form power-coordination solutions for the optimal EE are derived to show the convergence property of the algorithm. Moreover, a simplified algorithm is presented to reduce the complexity of the signaling overhead, which is significant for ultra-dense small cells. Finally, numerical simulations are provided to illustrate the efficiency of the proposed cooperative bargaining game-based and simplified schemes.

  3. Cooperative Game-Based Energy Efficiency Management over Ultra-Dense Wireless Cellular Networks

    Science.gov (United States)

    Li, Ming; Chen, Pengpeng; Gao, Shouwan

    2016-01-01

    Ultra-dense wireless cellular networks have been envisioned as a promising technique for handling the explosive increase of wireless traffic volume. With the extensive deployment of small cells in wireless cellular networks, the network spectral efficiency (SE) is improved with the use of limited frequency. However, the mutual inter-tier and intra-tier interference between or among small cells and macro cells becomes serious. On the other hand, more chances for potential cooperation among different cells are introduced. Energy efficiency (EE) has become one of the most important problems for future wireless networks. This paper proposes a cooperative bargaining game-based method for comprehensive EE management in an ultra-dense wireless cellular network, which highlights the complicated interference influence on energy-saving challenges and the power-coordination process among small cells and macro cells. Especially, a unified EE utility with the consideration of the interference mitigation is proposed to jointly address the SE, the deployment efficiency (DE), and the EE. In particular, closed-form power-coordination solutions for the optimal EE are derived to show the convergence property of the algorithm. Moreover, a simplified algorithm is presented to reduce the complexity of the signaling overhead, which is significant for ultra-dense small cells. Finally, numerical simulations are provided to illustrate the efficiency of the proposed cooperative bargaining game-based and simplified schemes. PMID:27649170

  4. Robust Nash Dynamic Game Strategy for User Cooperation Energy Efficiency in Wireless Cellular Networks

    Directory of Open Access Journals (Sweden)

    Shuhuan Wen

    2012-01-01

    Full Text Available Recently, there is an emerging trend of addressing “energy efficiency” aspect of wireless communications. It has been shown that cooperating users relay each other's information to improve data rates. The energy is limited in the wireless cellular network, but the mobile users refuse to relay. This paper presents an approach that encourages user cooperation in order to improve the energy efficiency. The game theory is an efficient method to solve such conflicts. We present a cellular framework in which two mobile users, who desire to communicate with a common base station, may cooperate via decode-and-forward relaying. In the case of imperfect information assumption, cooperative Nash dynamic game is used between the two users' cooperation to tackle the decision making problems: whether to cooperate and how to cooperate in wireless networks. The scheme based on “cooperative game theory” can achieve general pareto-optimal performance for cooperative games, and thus, maximize the entire system payoff while maintaining fairness.

  5. Persistent RCSMA: A MAC Protocol for a Distributed Cooperative ARQ Scheme in Wireless Networks

    Directory of Open Access Journals (Sweden)

    J. Alonso-Zárate

    2008-05-01

    Full Text Available The persistent relay carrier sensing multiple access (PRCSMA protocol is presented in this paper as a novel medium access control (MAC protocol that allows for the execution of a distributed cooperative automatic retransmission request (ARQ scheme in IEEE 802.11 wireless networks. The underlying idea of the PRCSMA protocol is to modify the basic rules of the IEEE 802.11 MAC protocol to execute a distributed cooperative ARQ scheme in wireless networks in order to enhance their performance and to extend coverage. A closed formulation of the distributed cooperative ARQ average packet transmission delay in a saturated network is derived in the paper. The analytical equations are then used to evaluate the performance of the protocol under different network configurations. Both the accuracy of the analysis and the performance evaluation of the protocol are supported and validated through computer simulations.

  6. The Role of Delay and Connectivity in Throughput Reduction of Cooperative Decentralized Wireless Networks

    Directory of Open Access Journals (Sweden)

    Ahmed Alkhayyat

    2015-01-01

    Full Text Available We proposed a multiple relay selection protocol for decentralized wireless networks. The proposed relays selection protocol aims to address three issues: (1 selecting relays within the coverage area of the source and destination to ensure that the relays are positioned one hop away from the destination, (2 ensuring that the best node (best relays with less distance and attenuation from the destination access the channel first, and (3 ensuring that the proposed relays selection is collision-free. Our analysis also considers three important characteristics of decentralized wireless networks that are directly affected by cooperation: delay, connectivity, and throughput. The main goal of this paper is to demonstrate that improving connectivity and increasing number of relays reduce the throughput of cooperative decentralized wireless networks; consequently, a trade-off equation has been derived.

  7. Cooperative and Distributed Localization for Wireless Sensor Networks in Multipath Environments

    CERN Document Server

    Leng, Mei; Quek, Tony Q S

    2011-01-01

    We consider the problem of sensor localization in a wireless network in a multipath environment, where time and angle of arrival information are available at each sensor. We propose a distributed algorithm based on belief propagation, which allows sensors to cooperatively self-localize with respect to one single anchor in a multihop network. The algorithm has low overhead and is scalable. Simulations show that although the network is loopy, the proposed algorithm converges, and achieves good localization accuracy.

  8. Implementation of cooperative virtual MISO communication in underwater acoustic wireless sensor networks

    Directory of Open Access Journals (Sweden)

    Mohammad Javad Jannati

    2011-07-01

    Full Text Available In this paper, for the first time, virtual antennas are used in an underwater acoustic wireless sensor network and their effects on total system performance are studied. In multiple input single output (MISO channels, spacial diversity is used to improve the system performance. In certain networks, especially in underwater networks, nodes are too small to have more than one antenna. Therefore, to achieve spacial diversity gain, cooperation between adjacent nodes can be a proper alternate method. For this purpose, each node of network tries to use its nearest adjacent node as a virtual antenna at some portions of time and with the aid of space time coding this new antenna profits from spacial diversity. It means that a cooperative virtual MISO scenario must be devised to determine the transmission and cooperation method in the network. Thus, the most frequently used cooperation schemes andamp;quot;decode and forward,andamp;quot; and andamp;quot;amplify and forward,andamp;quot; are applied, simulated and studied in an arbitrary underwater acoustic wireless sensor network and compared with the noncooperation mode. In this paper the alamouti space time coding, and the maximum ratio combiner are used to transmit, and combine data, respectively. Simulations show that virtual antenna in underwater wireless sensor networks can improve system performance up to 12.08%.

  9. Cooperative Spatial Reuse with Transmit Beamforming in Multi-rate Wireless Networks

    DEFF Research Database (Denmark)

    Lu, Chenguang; Fitzek, Frank; Eggers, Patrick Claus F.

    2009-01-01

    operation modes. One is TDMA mode while the other is spatial reuse mode in which links transmit simultaneously. Links contribute their own time slots to form a cooperative group to do spatial reuse. Each link joins the group only if it can benefit in capacity or energy efficiency. Otherwise, the link......We present a cooperative spatial reuse (CSR) scheme as a cooperative extension of the current TDMA-based MAC to enable spatial reuse in multi-rate wireless networks. We model spatial reuse as a cooperation problem on utilizing the time slots obtained from the TDMA-based MAC. In CSR, there are two...

  10. An energy efficient cooperative hierarchical MIMO clustering scheme for wireless sensor networks.

    Science.gov (United States)

    Nasim, Mehwish; Qaisar, Saad; Lee, Sungyoung

    2012-01-01

    In this work, we present an energy efficient hierarchical cooperative clustering scheme for wireless sensor networks. Communication cost is a crucial factor in depleting the energy of sensor nodes. In the proposed scheme, nodes cooperate to form clusters at each level of network hierarchy ensuring maximal coverage and minimal energy expenditure with relatively uniform distribution of load within the network. Performance is enhanced by cooperative multiple-input multiple-output (MIMO) communication ensuring energy efficiency for WSN deployments over large geographical areas. We test our scheme using TOSSIM and compare the proposed scheme with cooperative multiple-input multiple-output (CMIMO) clustering scheme and traditional multihop Single-Input-Single-Output (SISO) routing approach. Performance is evaluated on the basis of number of clusters, number of hops, energy consumption and network lifetime. Experimental results show significant energy conservation and increase in network lifetime as compared to existing schemes.

  11. Cooperation stimulation strategies for peer-to-peer wireless live video-sharing social networks.

    Science.gov (United States)

    Lin, W Sabrina; Zhao, H Vicky; Liu, K J Ray

    2010-07-01

    Human behavior analysis in video sharing social networks is an emerging research area, which analyzes the behavior of users who share multimedia content and investigates the impact of human dynamics on video sharing systems. Users watching live streaming in the same wireless network share the same limited bandwidth of backbone connection to the Internet, thus, they might want to cooperate with each other to obtain better video quality. These users form a wireless live-streaming social network. Every user wishes to watch video with high quality while paying as little as possible cost to help others. This paper focuses on providing incentives for user cooperation. We propose a game-theoretic framework to model user behavior and to analyze the optimal strategies for user cooperation simulation in wireless live streaming. We first analyze the Pareto optimality and the time-sensitive bargaining equilibrium of the two-person game. We then extend the solution to the multiuser scenario. We also consider potential selfish users' cheating behavior and malicious users' attacking behavior and analyze the performance of the proposed strategies with the existence of cheating users and malicious attackers. Both our analytical and simulation results show that the proposed strategies can effectively stimulate user cooperation, achieve cheat free and attack resistance, and help provide reliable services for wireless live streaming applications.

  12. Multipath TCP for user cooperation in wireless networks

    CERN Document Server

    Zhou, Dizhi

    2014-01-01

    This brief presents several enhancement modules to Multipath Transmission Control Protocol (MPTCP) in order to support stable and efficient multipath transmission with user cooperation in the Long Term Evolution (LTE) network. The text explains how these enhancements provide a stable aggregate throughput to the upper-layer applications; guarantee a steady goodput, which is the real application-layer perceived throughput; and ensure that the local traffic of the relays is not adversely affected when the relays are forwarding data for the destination. The performance of the proposed solutions is extensively evaluated using various scenarios. The simulation results demonstrate that the proposed modules can achieve a stable aggregate throughput and significantly improve the goodput by 1.5 times on average. The brief also shows that these extensions can well respect the local traffic of the relays and motivate the relay users to provide the relaying service.

  13. Energy Efficiency Analysis of a Two Dimensional Cooperative Wireless Sensor Network with Relay Selection

    Directory of Open Access Journals (Sweden)

    M. Kakitani

    2013-06-01

    Full Text Available The energy efficiency of non-cooperative and cooperative transmissions are investigated in a two-dimensional wireless sensor network, considering a target outage probability and the same end-to-end throughput for all transmission schemes. The impact of the relay selection method in the cooperative schemes is also analyzed. We show that under non line-of-sight conditions the relay selection method has a greater impact in the energy efficiency than the availability of a return channel. By its turn, under line-of-sight conditions a return channel is more valuable to the energy efficiency of cooperative transmission than the specific relay selection method. Finally, we demonstrate that the energy efficiency advantage of the cooperative over the non-cooperative transmission increases with the distance among nodes and with the nodes density.

  14. Spreading Code and Widely-Linear Receiver Design: Non-Cooperative Games for Wireless CDMA Networks

    CERN Document Server

    Buzzi, Stefano; Zappone, Alessio

    2009-01-01

    The issue of non-cooperative transceiver optimization in the uplink of a multiuser wireless code division multiple access data network with widely-linear detection at the receiver is considered. While previous work in this area has focused on a simple real signal model, in this paper a baseband complex representation of the data is used, so as to properly take into account the I and Q components of the received signal. For the case in which the received signal is improper, a widely-linear reception structure, processing separately the data and their complex conjugates, is considered. Several non-cooperative resource allocation games are considered for this new scenario, and the performance gains granted by the use of widely-linear detection are assessed through theoretical analysis. Numerical results confirm the validity of the theoretical findings, and show that exploiting the improper nature of the data in non-cooperative resource allocation brings remarkable performance improvements in multiuser wireless s...

  15. Efficient Cooperative Relaying in Wireless Multi-Hop Networks with Commodity WiFi Hardware

    OpenAIRE

    Volkhausen, Tobias; Dridger, Kornelius; Lichte, Hermann; Karl, Holger

    2012-01-01

    International audience; In wireless multi-hop networks, cooperative relaying exploits temporal and spatial diversity by additionally transmitting via a relay node and then combining direct and relay transmissions at the receiver. While such relaying improves packet error rates, it also costs an extra transmission. Along multi-hop paths, there often are nodes that can be a relay for multiple consecutive transmissions. This allows such a relay to transmit only once rather than on each individua...

  16. Cooperation in Carrier Sense Based Wireless Ad Hoc Networks - Part I: Reactive Schemes

    CERN Document Server

    Munari, Andrea; Zorzi, Michele

    2012-01-01

    Cooperative techniques have been shown to significantly improve the performance of wireless systems. Despite being a mature technology in single communication link scenarios, their implementation in wider, and practical, networks poses several challenges which have not been fully identified and understood so far. In this two-part paper, the implementation of cooperative communications in non-centralized ad hoc networks with sensing-based channel access is extensively discussed. Both analysis and simulation are employed to provide a clear understanding of the mutual influence between the link layer contention mechanism and collaborative protocols. Part I of this work focuses on reactive cooperation, in which relaying is triggered by packet delivery failure events, while Part II addresses proactive approaches, preemptively initiated by the source based on channel state information. Results show that sensing-based channel access significantly hampers the effectiveness of cooperation by biasing the spatial distri...

  17. Protocol for the application of cooperative MIMO based on clustering in sparse wireless sensor networks

    Institute of Scientific and Technical Information of China (English)

    WANG Qing-hua; QU Yu-gui; LIN Zhi-ting; BAI Rong-gang; ZHAO Bao-hua; PAN Quan-ke

    2007-01-01

    Wireless sensor networks (WSN) using cooperative multiple-input multiple-output (MIMO) communication are effective tools to collect data in several environments. However, how to apply cooperative MIMO in WSN remains a critical challenge, especially in sparse WSN. In this article, a novel clustering scheme is proposed for the application of cooperative MIMO in sparse WSN by extending the traditional low-energy adaptive clustering hierarchy (LEACH) protocol. This clustering scheme solves the problem that the cluster heads (CH) cannot find enough secondary cluster heads (SCH), which are used to cooperate and inform multiple-antenna transmitters with CHs. On the basis of this protocol, the overall energy consumption of the networks model is developed, and the optimal number of CHs is obtained. The simulation results show that this protocol is feasible for the sparse WSN. The simulation results also illustrate that this protocol provides significant energy efficiencies, even after allowing for additional overheads.

  18. Wireless Networks

    OpenAIRE

    Samaka, Mohammed; Khan, Khaled M.D.

    2007-01-01

    Wireless communication is the fastest-growing field in the telecommunication industry. Wireless networks have grown significantly as an important segment of the communications industry. They have become popular networks with the potential to provide high-speed, high-quality information exchange between two or more portable devices without any wire or conductors. Wireless networks can simply be characterized as the technology that provides seamless access to information, anywhere, anyplace, an...

  19. The Overall Balance Between Cooperation and Interference for a Class of Wireless Networks

    CERN Document Server

    Altieri, Andrés; Piantanida, Pablo; Galarza, Cecilia

    2012-01-01

    This paper investigates the benefits of cooperation in large wireless networks with multiple sources and relays, where the nodes form an homogeneous Poisson point process. The source nodes may dispose of their nearest neighbor from the set of inactive nodes as their relay. Although cooperation can potentially lead to significant improvements on the asymptotic error probability of a communication pair, relaying causes additional interference in the network, increasing the average noise. We address the basic question: how should source nodes optimally balance cooperation vs. interference to guarantee reliability in all communication pairs. Based on the decode-and-forward (DF) scheme at the relays (which is near optimal when the relays are close to their corresponding sources), we derive closed-form approximations to the upper bounds on the error probability, averaging over all node positions. Surprisingly, in the small node-density regime, there is an almost binary behaviour that dictates --depending on network...

  20. A cooperative MAC protocol with error-aware relay selection for wireless ad hoc networks

    Science.gov (United States)

    Liu, Shanzhi; Liu, Kai; Wang, Rui; Fang, Ruochen; Liu, Feng

    2017-01-01

    To solve performance degradation caused by channel fading, we propose a cooperative MAC protocol with error-aware relay selection for wireless ad hoc networks in this paper. In the protocol, the transmission error of data packet caused by channel fading are considered in order to achieve the best cooperative gain in the poor quality channel. In the relay selection process, potential relay nodes satisfying corresponding requirement can compete to sever as final relay node by means of priority selection and collision resolution process. Finally, simulation results show that the proposed protocol outperforms other protocol in terms of packet error rate and the saturation throughput.

  1. Lifetime Improvement of Wireless Sensor Networks by Collaborative Beamforming and Cooperative Transmission

    CERN Document Server

    Han, Zhu

    2007-01-01

    Extending network lifetime of battery-operated devices is a key design issue that allows uninterrupted information exchange among distributive nodes in wireless sensor networks. Collaborative beamforming (CB) and cooperative transmission (CT) have recently emerged as new communication techniques that enable and leverage effective resource sharing among collaborative/cooperative nodes. In this paper, we seek to maximize the lifetime of sensor networks by using the new idea that closely located nodes can use CB/CT to reduce the load or even avoid packet forwarding requests to nodes that have critical battery life. First, we study the effectiveness of CB/CT to improve the signal strength at a faraway destination using energy in nearby nodes. Then, a 2D disk case is analyzed to assess the resulting performance improvement. For general networks, if information-generation rates are fixed, the new routing problem is formulated as a linear programming problem; otherwise, the cost for routing is dynamically adjusted a...

  2. Cooperative Content Distribution over Wireless Networks for Energy and Delay Minimization

    KAUST Repository

    Atat, Rachad

    2012-06-01

    Content distribution with mobile-to-mobile cooperation is studied. Data is sent to mobile terminals on a long range link then the terminals exchange the content using an appropriate short range wireless technology. Unicasting and multicasting are investigated, both on the long range and short range links. Energy minimization is formulated as an optimization problem for each scenario, and the optimal solutions are determined in closed form. Moreover, the schemes are applied in public safety vehicular networks, where Long Term Evolution (LTE) network is used for the long range link, while IEEE 802.11 p is considered for inter-vehicle collaboration on the short range links. Finally, relay-based multicasting is applied in high speed trains for energy and delay minimization. Results show that cooperative schemes outperform non-cooperative ones and other previous related work in terms of energy and delay savings. Furthermore, practical implementation aspects of the proposed methods are also discussed.

  3. Cooperation in Carrier Sense Based Wireless Ad Hoc Networks - Part II: Proactive Schemes

    CERN Document Server

    Munari, Andrea; Zorzi, Michele

    2012-01-01

    This work is the second of a two-part series of papers on the effectiveness of cooperative techniques in non-centralized carrier sense-based ad hoc wireless networks. While Part I extensively discussed reactive cooperation, characterized by relayed transmissions triggered by failure events at the intended receiver, Part II investigates in depth proactive solutions, in which the source of a packet exploits channel state information to preemptively coordinate with relays in order to achieve the optimal overall rate to the destination. In particular, this work shows by means of both analysis and simulation that the performance of reactive cooperation is reduced by the intrinsic nature of the considered medium access policy, which biases the distribution of the available relays, locating them in unfavorable positions for rate optimization. Moreover, the highly dynamic nature of interference that characterizes non-infrastructured ad hoc networks is proved to hamper the efficacy and the reliability of preemptively ...

  4. Developing a Cooperative Intrusion Detection System for Wireless Sensor Networks

    Science.gov (United States)

    2010-11-01

    needs for WSNs and can be integrated into sensor network applications. The protocols must be adapted to use these frameworks. TinySec [11], ZigBee [12...conference on Embedded Networked Sensor Systems, November 2004. [12] ZigBee Alliance: ZigBee Specification. Technical Report Document 053474r06, June 2005

  5. Towards Reliable and Energy-Efficient Incremental Cooperative Communication for Wireless Body Area Networks.

    Science.gov (United States)

    Yousaf, Sidrah; Javaid, Nadeem; Qasim, Umar; Alrajeh, Nabil; Khan, Zahoor Ali; Ahmed, Mansoor

    2016-01-01

    In this study, we analyse incremental cooperative communication for wireless body area networks (WBANs) with different numbers of relays. Energy efficiency (EE) and the packet error rate (PER) are investigated for different schemes. We propose a new cooperative communication scheme with three-stage relaying and compare it to existing schemes. Our proposed scheme provides reliable communication with less PER at the cost of surplus energy consumption. Analytical expressions for the EE of the proposed three-stage cooperative communication scheme are also derived, taking into account the effect of PER. Later on, the proposed three-stage incremental cooperation is implemented in a network layer protocol; enhanced incremental cooperative critical data transmission in emergencies for static WBANs (EInCo-CEStat). Extensive simulations are conducted to validate the proposed scheme. Results of incremental relay-based cooperative communication protocols are compared to two existing cooperative routing protocols: cooperative critical data transmission in emergencies for static WBANs (Co-CEStat) and InCo-CEStat. It is observed from the simulation results that incremental relay-based cooperation is more energy efficient than the existing conventional cooperation protocol, Co-CEStat. The results also reveal that EInCo-CEStat proves to be more reliable with less PER and higher throughput than both of the counterpart protocols. However, InCo-CEStat has less throughput with a greater stability period and network lifetime. Due to the availability of more redundant links, EInCo-CEStat achieves a reduced packet drop rate at the cost of increased energy consumption.

  6. Partner selection strategies in cooperative wireless networks with optimal power distribution

    Institute of Scientific and Technical Information of China (English)

    ZHANG Qian-qian; GAO Wei-dong; PENG Mu-gen; WANG Wen-bo

    2008-01-01

    There have been several results that illustrate the best performance that a network can get through cooperation of relay nodes. For practical purposes, not all nodes in the network should be involved at the same time in every transmission. Therefore, optimal partner selection protocols in cooperative wireless networks are believed to be the first important thing that should be paid attention to. This problem in our article is considered in the context of regenerative nodes and non-altruistic cooperation (no pure relay exists; all nodes have their own data to transmit). For each transmission, the protocol must provide the user (source node) a 'best partner' (relay node) to cooperate with (for network simplicity and less transmission signals here, assume that each user has only one cooperative node). A criterion is essentially needed when defining what a 'best partner' is; in this article, two factors, i.e,. the successful transmission probability and the transmission power, are considered. Three optimal partner selection strategies with different goals are proposed and analyzed respectively. The simulation results show that these are all supposed to be good tradeoffs between power consumption and transmission performance.

  7. A Novel Practical Cooperative Diversity Method for the Power-Limited Wireless Sensor Network

    Institute of Scientific and Technical Information of China (English)

    ZHOU Liang; ZHENG Bao-yu

    2007-01-01

    A novel practical cooperative diversity method for power-limited wireless sensor network system was proposed.At first, the system model was presented and the cooperation problem is formulated under the minimum outage probability criterion, then the focus was put on the power efficiency of system, such as the relay selection,cooperation strategy and power allocation etc.At last the uniform procedure of the proposed method was given.The results of the simulation clearly demonstrate that our method not only has the properties of simple operation and wide applying scope, but also outperforms those of current classical methods on the aspect of outage probability under the basis of the same power limitation.

  8. A Routing Strategy for Non-Cooperation Wireless Multi-Hop Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dung T. Tran

    2012-01-01

    Full Text Available Choosing routes such that the network lifetime is maximized in a wireless network with limited energy resources is a major routing problem in wireless multi-hop ad hoc networks. In this paper, we study the problem where participants are rationally selfish and non-cooperative. By selfish we designate the users who are ready to tamper with their source-routing (senders could choose intermediate nodes in the routing paths or next hop selection strategies in order to increase the total number of packets transmitted, but do not try to harm or drop packets of the other nodes. The problem therefore amounts to a non-cooperative game. In the works [2,6,19,23], the authors show that the game admits Nash equilibria [1]. Along this line, we first show that if the cost function is linear, this game has pure-strategy equilibrium flow even though participants have different demands. However, finding a Nash equilibrium for a normal game is computationally hard [9]. In this work, inspired by mixed-strategy equilibrium, we propose a simple local routing algorithm called MIxed Path Routing protocol (MiPR. Using analysis and simulations, we show that MiPR drives the system to an equilibrium state where selfish participants do not have incentive to deviate. Moreover, MiPR significantly improves the network lifetime as compared to original routing protocols.

  9. Performance Analysis of Cooperative Virtual MIMO Systems for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Adnan Al-Anbuky

    2013-05-01

    Full Text Available Multi-Input Multi-Output (MIMO techniques can be used to increase the data rate for a given bit error rate (BER and transmission power. Due to the small form factor, energy and processing constraints of wireless sensor nodes, a cooperative Virtual MIMO as opposed to True MIMO system architecture is considered more feasible for wireless sensor network (WSN applications. Virtual MIMO with Vertical-Bell Labs Layered Space-Time (V-BLAST multiplexing architecture has been recently established to enhance WSN performance. In this paper, we further investigate the impact of different modulation techniques, and analyze for the first time, the performance of a cooperative Virtual MIMO system based on V-BLAST architecture with multi-carrier modulation techniques. Through analytical models and simulations using real hardware and environment settings, both communication and processing energy consumptions, BER, spectral efficiency, and total time delay of multiple cooperative nodes each with single antenna are evaluated. The results show that cooperative Virtual-MIMO with Binary Phase Shift Keying-Wavelet based Orthogonal Frequency Division Multiplexing (BPSK-WOFDM modulation is a promising solution for future high data-rate and energy-efficient WSNs.

  10. Performance Analysis of Cooperative Virtual MIMO Systems for Wireless Sensor Networks

    Science.gov (United States)

    Rafique, Zimran; Seet, Boon-Chong; Al-Anbuky, Adnan

    2013-01-01

    Multi-Input Multi-Output (MIMO) techniques can be used to increase the data rate for a given bit error rate (BER) and transmission power. Due to the small form factor, energy and processing constraints of wireless sensor nodes, a cooperative Virtual MIMO as opposed to True MIMO system architecture is considered more feasible for wireless sensor network (WSN) applications. Virtual MIMO with Vertical-Bell Labs Layered Space-Time (V-BLAST) multiplexing architecture has been recently established to enhance WSN performance. In this paper, we further investigate the impact of different modulation techniques, and analyze for the first time, the performance of a cooperative Virtual MIMO system based on V-BLAST architecture with multi-carrier modulation techniques. Through analytical models and simulations using real hardware and environment settings, both communication and processing energy consumptions, BER, spectral efficiency, and total time delay of multiple cooperative nodes each with single antenna are evaluated. The results show that cooperative Virtual-MIMO with Binary Phase Shift Keying-Wavelet based Orthogonal Frequency Division Multiplexing (BPSK-WOFDM) modulation is a promising solution for future high data-rate and energy-efficient WSNs. PMID:23760087

  11. Semi-Distributed Relay Selection Algorithm for Multi-User Cooperative Wireless Networks

    Directory of Open Access Journals (Sweden)

    Yafeng Wang

    2011-06-01

    Full Text Available In this paper, we propose a novel semi-distributed algorithm with low overhead and complexity for multi-user cooperative wireless networks with opportunistic relaying. The source is required to satisfy its minimum rate requirement with a feasible relay and help another source as a relay. The optimal solution can be obtained by exhaustive search with intractable computational complexity. Simulation results suggest that the proposed relay selection algorithm has the similar outage probability as the exhaustive search approach but with much less computational burden.

  12. Optimizing the Number of Cooperating Terminals for Energy Aware Task Computing in Wireless Networks

    DEFF Research Database (Denmark)

    Olsen, Anders Brødløs; Fitzek, Frank H. P.; Koch, Peter

    2005-01-01

    is previously proposed (D2VS), where the overall idea of selective distribution of tasks among terminals is made. In this paper the optimal number of terminals for cooperative task computing in a wireless network will be investigated. The paper presents an energy model for the proposed scheme. Energy......It is generally accepted that energy consumption is a significant design constraint for mobile handheld systems, therefore motivations for methods optimizing the energy consumption making better use of the restricted battery resources are evident. A novel concept of distributed task computing...

  13. Distributed and Cooperative Link Scheduling for Large-Scale Multihop Wireless Networks

    Directory of Open Access Journals (Sweden)

    Ananthram Swami

    2007-12-01

    Full Text Available A distributed and cooperative link-scheduling (DCLS algorithm is introduced for large-scale multihop wireless networks. With this algorithm, each and every active link in the network cooperatively calibrates its environment and converges to a desired link schedule for data transmissions within a time frame of multiple slots. This schedule is such that the entire network is partitioned into a set of interleaved subnetworks, where each subnetwork consists of concurrent cochannel links that are properly separated from each other. The desired spacing in each subnetwork can be controlled by a tuning parameter and the number of time slots specified for each frame. Following the DCLS algorithm, a distributed and cooperative power control (DCPC algorithm can be applied to each subnetwork to ensure a desired data rate for each link with minimum network transmission power. As shown consistently by simulations, the DCLS algorithm along with a DCPC algorithm yields significant power savings. The power savings also imply an increased feasible region of averaged link data rates for the entire network.

  14. Distributed and Cooperative Link Scheduling for Large-Scale Multihop Wireless Networks

    Directory of Open Access Journals (Sweden)

    Swami Ananthram

    2007-01-01

    Full Text Available A distributed and cooperative link-scheduling (DCLS algorithm is introduced for large-scale multihop wireless networks. With this algorithm, each and every active link in the network cooperatively calibrates its environment and converges to a desired link schedule for data transmissions within a time frame of multiple slots. This schedule is such that the entire network is partitioned into a set of interleaved subnetworks, where each subnetwork consists of concurrent cochannel links that are properly separated from each other. The desired spacing in each subnetwork can be controlled by a tuning parameter and the number of time slots specified for each frame. Following the DCLS algorithm, a distributed and cooperative power control (DCPC algorithm can be applied to each subnetwork to ensure a desired data rate for each link with minimum network transmission power. As shown consistently by simulations, the DCLS algorithm along with a DCPC algorithm yields significant power savings. The power savings also imply an increased feasible region of averaged link data rates for the entire network.

  15. Exploiting Outage and Error Probability of Cooperative Incremental Relaying in Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hina Nasir

    2016-07-01

    Full Text Available This paper embeds a bi-fold contribution for Underwater Wireless Sensor Networks (UWSNs; performance analysis of incremental relaying in terms of outage and error probability, and based on the analysis proposition of two new cooperative routing protocols. Subject to the first contribution, a three step procedure is carried out; a system model is presented, the number of available relays are determined, and based on cooperative incremental retransmission methodology, closed-form expressions for outage and error probability are derived. Subject to the second contribution, Adaptive Cooperation in Energy (ACE efficient depth based routing and Enhanced-ACE (E-ACE are presented. In the proposed model, feedback mechanism indicates success or failure of data transmission. If direct transmission is successful, there is no need for relaying by cooperative relay nodes. In case of failure, all the available relays retransmit the data one by one till the desired signal quality is achieved at destination. Simulation results show that the ACE and E-ACE significantly improves network performance, i.e., throughput, when compared with other incremental relaying protocols like Cooperative Automatic Repeat reQuest (CARQ. E-ACE and ACE achieve 69% and 63% more throughput respectively as compared to CARQ in hard underwater environment.

  16. Decentralized Cooperative TOA/AOA Target Tracking for Hierarchical Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chih-Yu Wen

    2012-11-01

    Full Text Available This paper proposes a distributed method for cooperative target tracking in hierarchical wireless sensor networks. The concept of leader-based information processingis conducted to achieve object positioning, considering a cluster-based network topology. Random timers and local information are applied to adaptively select a sub-cluster for thelocalization task. The proposed energy-efficient tracking algorithm allows each sub-clustermember to locally estimate the target position with a Bayesian filtering framework and a neural networking model, and further performs estimation fusion in the leader node with the covariance intersection algorithm. This paper evaluates the merits and trade-offs of the protocol design towards developing more efficient and practical algorithms for objectposition estimation. 

  17. Decentralized cooperative TOA/AOA target tracking for hierarchical wireless sensor networks.

    Science.gov (United States)

    Chen, Ying-Chih; Wen, Chih-Yu

    2012-11-08

    This paper proposes a distributed method for cooperative target tracking in hierarchical wireless sensor networks. The concept of leader-based information processing is conducted to achieve object positioning, considering a cluster-based network topology. Random timers and local information are applied to adaptively select a sub-cluster for the localization task. The proposed energy-efficient tracking algorithm allows each sub-cluster member to locally estimate the target position with a Bayesian filtering framework and a neural networking model, and further performs estimation fusion in the leader node with the covariance intersection algorithm. This paper evaluates the merits and trade-offs of the protocol design towards developing more efficient and practical algorithms for object position estimation.

  18. Cooperative Coding and Caching for Streaming Data in Multihop Wireless Networks

    Directory of Open Access Journals (Sweden)

    Dan Wang

    2010-01-01

    Full Text Available This paper studies the distributed caching managements for the current flourish of the streaming applications in multihop wireless networks. Many caching managements to date use randomized network coding approach, which provides an elegant solution for ubiquitous data accesses in such systems. However, the encoding, essentially a combination operation, makes the coded data difficult to be changed. In particular, to accommodate new data, the system may have to first decode all the combined data segments, remove some unimportant ones, and then reencode the data segments again. This procedure is clearly expensive for continuously evolving data storage. As such, we introduce a novel Cooperative Coding and Caching (C3 scheme, which allows decoding-free data removal through a triangle-like codeword organization. Its decoding performance is very close to the conventional network coding with only a sublinear overhead. Our scheme offers a promising solution to the caching management for streaming data.

  19. Cooperative Coding and Caching for Streaming Data in Multihop Wireless Networks

    Directory of Open Access Journals (Sweden)

    Liu Jiangchuan

    2010-01-01

    Full Text Available This paper studies the distributed caching managements for the current flourish of the streaming applications in multihop wireless networks. Many caching managements to date use randomized network coding approach, which provides an elegant solution for ubiquitous data accesses in such systems. However, the encoding, essentially a combination operation, makes the coded data difficult to be changed. In particular, to accommodate new data, the system may have to first decode all the combined data segments, remove some unimportant ones, and then reencode the data segments again. This procedure is clearly expensive for continuously evolving data storage. As such, we introduce a novel Cooperative Coding and Caching ( scheme, which allows decoding-free data removal through a triangle-like codeword organization. Its decoding performance is very close to the conventional network coding with only a sublinear overhead. Our scheme offers a promising solution to the caching management for streaming data.

  20. Energy-Aware Adaptive Cooperative FEC Protocol in MIMO Channel for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yong Jin

    2013-01-01

    Full Text Available We propose an adaptive cooperative forward error correction (ACFEC based on energy efficiency combining Reed-Solomon (RS coder algorithm and multiple input multiple output (MIMO channel technology with monitoring signal-to-noise ratio (SNR in wireless sensor networks. First, we propose a new Markov chain model for FEC based on RS codes and derive the expressions for QoS on the basis of this model, which comprise four metrics: throughput, packet error rate, delay, and energy efficiency. Then, we apply RS codes with the MIMO channel technology to the cross-layer design. Numerical and simulation results show that the joint design of MIMO and adaptive cooperative FEC based on RS codes can achieve considerable spectral efficiency gain, real-time performance, reliability, and energy utility.

  1. Optimal Routing for Decode-and-Forward based Cooperation in Wireless Networks

    CERN Document Server

    Ong, Lawrence

    2007-01-01

    We investigate cooperative wireless relay networks in which the nodes can help each other in data transmission. We study different coding strategies in the single-source single-destination network with many relay nodes. Given the myriad of ways in which nodes can cooperate, there is a natural routing problem, i.e., determining an ordered set of nodes to relay the data from the source to the destination. We find that for a given route, the decode-and-forward strategy, which is an information theoretic cooperative coding strategy, achieves rates significantly higher than that achievable by the usual multi-hop coding strategy, which is a point-to-point non-cooperative coding strategy. We construct an algorithm to find an optimal route (in terms of rate maximizing) for the decode-and-forward strategy. Since the algorithm runs in factorial time in the worst case, we propose a heuristic algorithm that runs in polynomial time. The heuristic algorithm outputs an optimal route when the nodes transmit independent codew...

  2. Wireless Power Transfer in Cooperative DF Relaying Networks with Log-Normal Fading

    KAUST Repository

    Rabie, Khaled M.

    2017-02-07

    Energy-harvesting (EH) and wireless power transfer in cooperative relaying networks have recently attracted a considerable amount of research attention. Most of the existing work on this topic however focuses on Rayleigh fading channels which represents outdoor environments. Unlike these studies, in this paper we analyze the performance of wireless power transfer in two-hop decode-and- forward (DF) cooperative relaying systems in indoor channels characterized by log-normal fading. Three well-known EH protocols are considered in our evaluations: a) time switching relaying (TSR), b) power splitting relaying (PSR) and c) ideal relaying receiver (IRR). The performance is evaluated in terms of the ergodic outage probability for which we derive accurate analytical expressions for the three systems under consideration. Results reveal that careful selection of the EH time and power splitting factors in the TSR- and PSR-based system are important to optimize performance. It is also presented that the optimized PSR system has near- ideal performance and that increasing the source transmit power and/or the energy harvester efficiency can further improve performance.

  3. Parity-Check Network Coding for Multiple Access Relay Channel in Wireless Sensor Cooperative Communications

    Directory of Open Access Journals (Sweden)

    Du Bing

    2010-01-01

    Full Text Available A recently developed theory suggests that network coding is a generalization of source coding and channel coding and thus yields a significant performance improvement in terms of throughput and spatial diversity. This paper proposes a cooperative design of a parity-check network coding scheme in the context of a two-source multiple access relay channel (MARC model, a common compact model in hierarchical wireless sensor networks (WSNs. The scheme uses Low-Density Parity-Check (LDPC as the surrogate to build up a layered structure which encapsulates the multiple constituent LDPC codes in the source and relay nodes. Specifically, the relay node decodes the messages from two sources, which are used to generate extra parity-check bits by a random network coding procedure to fill up the rate gap between Source-Relay and Source-Destination transmissions. Then, we derived the key algebraic relationships among multidimensional LDPC constituent codes as one of the constraints for code profile optimization. These extra check bits are sent to the destination to realize a cooperative diversity as well as to approach MARC decode-and-forward (DF capacity.

  4. An 802.11k Compliant Framework for Cooperative Handoff in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Korakis Thanasis

    2009-01-01

    Full Text Available Abstract In IEEE 802.11-based wireless networks, the stations (STAs are associated with the available access points (APs and communicate through them. In traditional handoff schemes, the STAs get information about the active APs in their neighborhood by scanning the available channels and listening to transmitted beacons. This paper proposes an 802.11k compliant framework for cooperative handoff where the STAs are informed about the active APs by exchanging information with neighboring STAs. Besides, the APs share useful information that can be used by the STAs in a handoff process. In this way, we minimize the delay of the scanning procedure. We evaluate the performance of our mechanisms through OPNET simulations. We demonstrate that our scheme reduces the scanning delay up to 92%. Consequently, our system is more capable in meeting the needs of QoS-sensitive applications.

  5. A Localization Based Cooperative Routing Protocol for Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nadeem Javaid

    2017-01-01

    Full Text Available Localization is one of the major aspects in underwater wireless sensor networks (UWSNs. Therefore, it is important to know the accurate position of the sensor node in large scale applications like disaster prevention, tactical surveillance, and monitoring. Due to the inefficiency of the global positioning system (GPS in UWSN, it is very difficult to localize a node in underwater environment compared to terrestrial networks. To minimize the localization error and enhance the localization coverage of the network, two routing protocols are proposed; the first one is mobile autonomous underwater vehicle (MobiL-AUV and the second one is cooperative MobiL (CO-MobiL. In MobiL-AUV, AUVs are deployed and equipped with GPS and act as reference nodes. These reference nodes are used to localize all the nonlocalized ordinary sensor nodes in order to reduce the localization error and maximize the network coverage. CO-MobiL is presented in order to improve the network throughput by using the maximal ratio combining (MRC as diversity technique which combines both signals, received from the source and received from the relay at the destination. It uses amplify-and-forward (AF mechanism to improve the signal between the source and the destination. To support our claims, extensive simulations are performed.

  6. Exploring Relay Cooperation for Secure and Reliable Transmission in Two-HopWireless Networks

    Directory of Open Access Journals (Sweden)

    Yulong Shen

    2014-03-01

    Full Text Available This work considers the problem of secure and reliable information transmission via relay cooperation in two-hop relay wireless networks without the information of both eavesdropper channels and locations. While previous work on this problem mainly studied infinite networks and their asymptotic behavior and scaling law results, this papers focuses on a more practical network with finite number of system nodes and explores the corresponding exact result on the number of eavesdroppers one network can tolerate to ensure desired secrecy and reliability. We first study the scenario where path-loss is equal between all pairs of nodes and consider two transmission protocols there, one adopts an optimal but complex relay selection process with less load balance capacity while the other adopts a random but simple relay selection process with good load balance capacity. Theoretical analysis and numerical results are then provided to determine the maximum number of eavesdroppers one network can tolerate to ensure a desired performance in terms of the secrecy outage probability and transmission outage probability. We further extend our study to the more general scenario where path-loss between each pair of nodes also depends on the distance between them, for which a new transmission protocol with both preferable relay selection and good load balance as well as the corresponding theoretical analysis and numerical results are presented.

  7. Non-cooperative Feedback Rate Control Game for Channel State Information in Wireless Networks

    CERN Document Server

    Song, Lingyang; Zhang, Zhongshan; Jiao, Bingli

    2011-01-01

    It has been well recognized that channel state information (CSI) feedback is of great importance for dowlink transmissions of closed-loop wireless networks. However, the existing work typically researched the CSI feedback problem for each individual mobile station (MS), and thus, cannot efficiently model the interactions among self-interested mobile users in the network level. To this end, in this paper, we propose an alternative approach to investigate the CSI feedback rate control problem in the analytical setting of a game theoretic framework, in which a multiple-antenna base station (BS) communicates with a number of co-channel MSs through linear precoder. Specifically, we first present a non-cooperative feedback-rate control game (NFC), in which each MS selects the feedback rate to maximize its performance in a distributed way. To improve efficiency from a social optimum point of view, we then introduce pricing, called the non-cooperative feedback-rate control game with price (NFCP). The game utility is ...

  8. On Multi-Hop Decode-and-Forward Cooperative Relaying for Industrial Wireless Sensor Networks.

    Science.gov (United States)

    Ai, Yun; Cheffena, Michael

    2017-03-28

    Wireless sensor networks (WSNs) will play a fundamental role in the realization of Internet of Things and Industry 4.0. Arising from the presence of spatially distributed sensor nodes in a sensor network, cooperative diversity can be achieved by using the sensor nodes between a given source-destination pair as intermediate relay stations. In this paper, we investigate the end-to-end average bit error rate (BER) and the channel capacity of a multi-hop relay network in the presence of impulsive noise modeled by the well-known Middleton's class-A model. Specifically, we consider a multi-hop decode-and-forward (DF) relay network over Nakagami-m fading channel due to its generality, but also due to the absence of reported works in this area. Closed-form analytical expressions for the end-to-end average BER and the statistical properties of the end-to-end channel capacity are obtained. The impacts of the channel parameters on these performance quantities are evaluated and discussed.

  9. Outage Performance Analysis of Relay Selection Schemes in Wireless Energy Harvesting Cooperative Networks over Non-Identical Rayleigh Fading Channels.

    Science.gov (United States)

    Do, Nhu Tri; Bao, Vo Nguyen Quoc; An, Beongku

    2016-02-26

    In this paper, we study relay selection in decode-and-forward wireless energy harvesting cooperative networks. In contrast to conventional cooperative networks, the relays harvest energy from the source's radio-frequency radiation and then use that energy to forward the source information. Considering power splitting receiver architecture used at relays to harvest energy, we are concerned with the performance of two popular relay selection schemes, namely, partial relay selection (PRS) scheme and optimal relay selection (ORS) scheme. In particular, we analyze the system performance in terms of outage probability (OP) over independent and non-identical (i.n.i.d.) Rayleigh fading channels. We derive the closed-form approximations for the system outage probabilities of both schemes and validate the analysis by the Monte-Carlo simulation. The numerical results provide comprehensive performance comparison between the PRS and ORS schemes and reveal the effect of wireless energy harvesting on the outage performances of both schemes. Additionally, we also show the advantages and drawbacks of the wireless energy harvesting cooperative networks and compare to the conventional cooperative networks.

  10. Compression and Combining Based on Channel Shortening and Rank Reduction Technique for Cooperative Wireless Sensor Networks

    KAUST Repository

    Ahmed, Qasim Zeeshan

    2013-12-18

    This paper investigates and compares the performance of wireless sensor networks where sensors operate on the principles of cooperative communications. We consider a scenario where the source transmits signals to the destination with the help of L sensors. As the destination has the capacity of processing only U out of these L signals, the strongest U signals are selected while the remaining (L?U) signals are suppressed. A preprocessing block similar to channel-shortening is proposed in this contribution. However, this preprocessing block employs a rank-reduction technique instead of channel-shortening. By employing this preprocessing, we are able to decrease the computational complexity of the system without affecting the bit error rate (BER) performance. From our simulations, it can be shown that these schemes outperform the channel-shortening schemes in terms of computational complexity. In addition, the proposed schemes have a superior BER performance as compared to channel-shortening schemes when sensors employ fixed gain amplification. However, for sensors which employ variable gain amplification, a tradeoff exists in terms of BER performance between the channel-shortening and these schemes. These schemes outperform channel-shortening scheme for lower signal-to-noise ratio.

  11. Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming

    Directory of Open Access Journals (Sweden)

    Maoqiang Yang

    2016-11-01

    Full Text Available In this paper, we investigate the secure transmission in wireless sensor networks (WSNs consisting of one multiple-antenna base station (BS, multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative jammer. In an effort to reduce the scheduling complexity and extend the battery lifetime of the sensor nodes, the switch-and-stay combining (SSC scheduling scheme is exploited over the sensor nodes. Meanwhile, transmit antenna selection (TAS is employed at the BS and cooperative jamming (CJ is adopted at the jammer node, aiming at achieving a satisfactory secrecy performance. Moreover, depending on whether the jammer node has the global channel state information (CSI of both the legitimate channel and the eavesdropper’s channel, it explores a zero-forcing beamforming (ZFB scheme or a null-space artificial noise (NAN scheme to confound the eavesdropper while avoiding the interference to the legitimate user. Building on this, we propose two novel hybrid secure transmission schemes, termed TAS-SSC-ZFB and TAS-SSC-NAN, for WSNs. We then derive the exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput of both schemes to characterize the secrecy performance. Using these closed-form expressions, we further determine the optimal switching threshold and obtain the optimal power allocation factor between the BS and jammer node for both schemes to minimize the secrecy outage probability, while the optimal secrecy rate is decided to maximize the effective secrecy throughput for both schemes. Numerical results are provided to verify the theoretical analysis and illustrate the impact of key system parameters on the secrecy performance.

  12. Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming.

    Science.gov (United States)

    Yang, Maoqiang; Zhang, Bangning; Huang, Yuzhen; Yang, Nan; Guo, Daoxing; Gao, Bin

    2016-11-12

    In this paper, we investigate the secure transmission in wireless sensor networks (WSNs) consisting of one multiple-antenna base station (BS), multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative jammer. In an effort to reduce the scheduling complexity and extend the battery lifetime of the sensor nodes, the switch-and-stay combining (SSC) scheduling scheme is exploited over the sensor nodes. Meanwhile, transmit antenna selection (TAS) is employed at the BS and cooperative jamming (CJ) is adopted at the jammer node, aiming at achieving a satisfactory secrecy performance. Moreover, depending on whether the jammer node has the global channel state information (CSI) of both the legitimate channel and the eavesdropper's channel, it explores a zero-forcing beamforming (ZFB) scheme or a null-space artificial noise (NAN) scheme to confound the eavesdropper while avoiding the interference to the legitimate user. Building on this, we propose two novel hybrid secure transmission schemes, termed TAS-SSC-ZFB and TAS-SSC-NAN, for WSNs. We then derive the exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput of both schemes to characterize the secrecy performance. Using these closed-form expressions, we further determine the optimal switching threshold and obtain the optimal power allocation factor between the BS and jammer node for both schemes to minimize the secrecy outage probability, while the optimal secrecy rate is decided to maximize the effective secrecy throughput for both schemes. Numerical results are provided to verify the theoretical analysis and illustrate the impact of key system parameters on the secrecy performance.

  13. A Non-Cooperative Game Theoretical Approach For Power Control In Virtual MIMO Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    R.Valli

    2010-07-01

    Full Text Available Power management is one of the vital issue in wireless sensor networks, where the lifetime of the networkrelies on battery powered nodes. Transmitting at high power reduces the lifetime of both the nodes andthe network. One efficient way of power management is to control the power at which the nodes transmit.In this paper, a virtual multiple input multiple output wireless sensor network (VMIMO-WSNcommunication architecture is considered and the power control of sensor nodes based on the approachof game theory is formulated. The use of game theory has proliferated, with a broad range of applicationsin wireless sensor networking. Approaches from game theory can be used to optimize node level as wellas network wide performance. The game here is categorized as an incomplete information game, in whichthe nodes do not have complete information about the strategies taken by other nodes. For virtualmultiple input multiple output wireless sensor network architecture considered, the Nash equilibrium isused to decide the optimal power level at which a node needs to transmit, to maximize its utility. Outcomeshows that the game theoretic approach considered for VMIMO-WSN architecture achieves the bestutility, by consuming less power.

  14. Diversity and Coding Gain of Multi-Source Multi-Relay Cooperative Wireless Networks with Binary Network Coding

    CERN Document Server

    Di Renzo, Marco; Graziosi, Fabio

    2011-01-01

    In this paper, a multi-source multi-relay cooperative wireless network with binary network coding is studied. The system model encompasses: i) a demodulate-and-forward protocol at the relays, where the received packets are forwarded regardless of their reliability; and ii) a maximum-likelihood optimum decoder at the destination, which accounts for possible decoding errors at the relays. An asymptotically-tight and closed-form expression of the end-to-end error probability is derived, which clearly showcases diversity and coding gain of each source. Unlike other papers available in the literature, the proposed framework has three main distinguishable features: i) it is useful for general network topologies and arbitrary binary encoding vectors; ii) it shows how network code and two-hop forwarding protocol affect diversity and coding gain; and ii) it accounts for realistic fading channels and decoding errors at the relays. The framework provides three main conclusions: i) each source achieves a diversity order ...

  15. An Efficient Data Collection Protocol Based on Multihop Routing and Single-Node Cooperation in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Guoqiang Zheng

    2014-01-01

    Full Text Available Considering the constrained resource and energy in wireless sensor networks, an efficient data collection protocol named ESCDD which adopts the multihop routing technology and the single-node selection cooperative communication is proposed to make the communication protocol more simple and easy to realize for the large-scale multihop wireless sensor networks. ESCDD uses the greedy strategy and the control information based on RTS/CTS to select forwarding nodes. Then, the hops in the multihop data transmission are reduced. Based on the power control in physical layer and the control frame called CoTS in MAC layer, ESCDD chooses a single cooperative node to perform cooperative transmission. The receiving node adopts maximal ratio combining (MRC to recover original data. The energy consumption per hop is reduced. Furthermore, the total energy consumption in data collection process is shared by more nodes and the network lifetime is extended. Compared with GeRaF, EERNFS, and REEFG protocol, the simulation results show that ESCDD can effectively reduce the average delay of multihop data transmission, improve the successful delivery rate of data packets, significantly save the energy consumption of network nodes, and make the energy consumption more balanced.

  16. Enabling Mobility in Heterogeneous Wireless Sensor Networks Cooperating with UAVs for Mission-Critical Management

    NARCIS (Netherlands)

    Erman-Tüysüz, A.; Hoesel, van L.F.W.; Havinga, P.J.M.; Wu, Jian

    2008-01-01

    Wireless sensor networks have the promise of revolutionizing the capture, processing, and communication of mission-critical data for the use of first operational forces. Their low cost, low power, and size make it feasible to embed them into environment monitoring tags in critical care regions, firs

  17. Enabling Mobility in Heterogeneous Wireless Sensor Networks Cooperating with UAVs for Mission-Critical Management

    NARCIS (Netherlands)

    Erman-Tüysüz, A.; Hoesel, van L.F.W.; Wu, Jian; Havinga, P.J.M.

    2008-01-01

    Wireless sensor networks (WSNs) have the promise of revolutionizing the capture, processing, and communication of mission critical data for the use of first operational forces. Their low-cost, low-power, and size make it feasible to embed them into environment-monitoring tags in critical care region

  18. A novel power efficient location-based cooperative routing with transmission power-upper-limit for wireless sensor networks.

    Science.gov (United States)

    Shi, Juanfei; Calveras, Anna; Cheng, Ye; Liu, Kai

    2013-05-15

    The extensive usage of wireless sensor networks (WSNs) has led to the development of many power- and energy-efficient routing protocols. Cooperative routing in WSNs can improve performance in these types of networks. In this paper we discuss the existing proposals and we propose a routing algorithm for wireless sensor networks called Power Efficient Location-based Cooperative Routing with Transmission Power-upper-limit (PELCR-TP). The algorithm is based on the principle of minimum link power and aims to take advantage of nodes cooperation to make the link work well in WSNs with a low transmission power. In the proposed scheme, with a determined transmission power upper limit, nodes find the most appropriate next nodes and single-relay nodes with the proposed algorithm. Moreover, this proposal subtly avoids non-working nodes, because we add a Bad nodes Avoidance Strategy (BAS). Simulation results show that the proposed algorithm with BAS can significantly improve the performance in reducing the overall link power, enhancing the transmission success rate and decreasing the retransmission rate.

  19. Wireless Sensor Network Based Smart Parking System

    National Research Council Canada - National Science Library

    Jeffrey Joseph; Roshan Gajanan Patil; Skanda Kumar Kaipu Narahari; Yogish Didagi; Jyotsna Bapat; Debabrata Das

    2014-01-01

    ... system. Wireless Sensor Networks are one such class of networks, which meet these criteria. These networks consist of spatially distributed sensor motes which work in a co-operative manner to sense and control the environment...

  20. QoS awared power and admission controls based on non-cooperative game theory in wireless networks

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    In order to better accommodate heterogeneous quality of service (QoS) in wireless networks, an algorithm called QeS-aware power and admission controls (QAPAC) is proposed. The system is modeled as u non- cooperative game where the users adjust their transmit powers to maximize the utility, thus restraining the interferences. By using adaptive utility functions and tunable pricing parameters according to QoS levels, this algorithm can well meet different QoS reqniremcnts and improve system capacity compared with those that ignore the QoS differ- ences.

  1. QoS awared power and admission controls based on non-cooperative game theory in wireless networks

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    In order to better accommodate heterogeneous quality of service (QoS) in wireless networks, an algorithm called QoS-aware power and admission controls (QAPAC) is proposed. The system is modeled as a non-cooperative game where the users adjust their transmit powers to maximize the utility, thus restraining the interferences. By using adaptive utility functions and tunable pricing parameters according to QoS levels, this algorithm can well meet different QoS requirements and improve system capacity compared w...

  2. An Isolation Intrusion Detection System for Hierarchical Wireless Sensor Networks

    OpenAIRE

    Rung-Ching Chen; Chia-Fen Hsieh; Yung-Fa Huang

    2010-01-01

    A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor environmental conditions, such as battlefield data and personal health information, and some environment limited resources. To avoid malicious damage is important while information is transmitted in wireless network. Thus, Wireless Intrusion Detection Systems are crucial to safe operation in wireless sensor networks. Wireless networks are subject ...

  3. Minimizing The Completion Time Of A Wireless Cooperative Network Using Network Coding

    DEFF Research Database (Denmark)

    Roetter, Daniel Enrique Lucani; Khamfroush, Hana; Barros, João

    2013-01-01

    network coding solution in terms of completion time, outperforms broadcasting with network coding by a factor of 2.13 and outperforms forwarding mechanisms by a factor of 6.1. Beyond computing the optimal completion time, we identify the critical decision policies derived from the MDP solution....

  4. An Issue of Boundary Value for Velocity and Training Overhead Using Cooperative MIMO Technique in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    M. R. Islam

    2011-06-01

    Full Text Available A boundary value of velocity of data gathering node (DGN and a critical value for training overhead beyond which the cooperative communication in wireless sensor network will not be feasible is proposed in this paper. Multiple Input Multiple Outputs (MIMO cooperative communication is taken as an application. The performance in terms of energy efficiency and delay for a combination of two transmitting and two receiving antennas is analyzed. The results show that a set of critical value of velocity and training overhead pair is present for the long haul communication from the sensors to the data gathering node. Later a graphical relation between boundary value of training overhead and velocity is simulated. A mathematical relation between velocity and training overhead is also developed. The effects of several parameters on training overhead and velocity are analyzed.

  5. CoopGeo: A Beaconless Geographic Cross-Layer Protocol for Cooperative Wireless Ad Hoc Networks

    CERN Document Server

    Aguilar, Teck; Gauthier, Vincent; Afifi, Hossam; Wang, Chin-Liang; 10.1109/TWC.2011.060711.100480

    2012-01-01

    Cooperative relaying has been proposed as a promising transmission technique that effectively creates spatial diversity through the cooperation among spatially distributed nodes. However, to achieve efficient communications while gaining full benefits from cooperation, more interactions at higher protocol layers, particularly the MAC (Medium Access Control) and network layers, are vitally required. This is ignored in most existing articles that mainly focus on physical (PHY)-layer relaying techniques. In this paper, we propose a novel cross-layer framework involving two levels of joint design---a MAC-network cross-layer design for forwarder selection (or termed routing) and a MAC-PHY for relay selection---over symbol-wise varying channels. Based on location knowledge and contention processes, the proposed cross-layer protocol, CoopGeo, aims at providing an efficient, distributed approach to select next hops and optimal relays along a communication path. Simulation results demonstrate that CoopGeo not only ope...

  6. Information Centric Networking based Handover Support for QoS Maintenance in Cooperative Heterogeneous Wireless Networks

    CERN Document Server

    Saleem, Muhammad Shoaib; Zeghlache, Djamal

    2011-01-01

    Network of Information (NetInf) is a term coined for networks which unlike contemporary network are not node centric. As the name indicates, information supersedes nodes in the network. In this report, we propose an architecture of mobile node for NetInf. We call it NetInf Mobile Node. It is an extension of the basic node architecture proposed for NetInf. It is compatible to NetInf and TCP/IP based networks. The Virtual Node Layer modules in the architecture provide support for managing mobility, power consumption of the node as well data relaying/storing services. In- ner/Outer Locator Construction Routers (I/O LCTR) are two functions introduced in NetInf mobile nodes to operate between NetInf and non- NetInf sites. The basic purpose of NetInf mobile node is to maintain the QoS during mobility events. The handoff/handover are critical situations during mobility where chances of QoS degradation of an ongoing session are high. This report presents one such scenario in which QoS of an appli- cation is maintaine...

  7. Energy-Efficient Node Scheduling Method for Cooperative Target Tracking in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Weirong Liu

    2015-01-01

    Full Text Available Using the sensor nodes to achieve target tracking is a challenging problem in resource-limited wireless sensor networks. The tracking nodes are usually required to consume much energy to improve the tracking performance. In this paper, an energy-efficient node scheduling method is proposed to minimize energy consumption while ensuring the tracking accuracy. Firstly, the Kalman-consensus filter is constructed to improve the tracking accuracy and predict the target position. Based on the predicted position, an adaptive node scheduling mechanism is utilized to adjust the sample interval and the number of active nodes dynamically. Rather than using traditional search algorithm, the scheduling problem is decomposed to decouple the sample interval and number of nodes. And the node index is mapped into real domain to get closed-form solution to decide the active nodes. Thus, the NP-complete nature is avoided in the proposed method. The proposed scheduling method can keep the tracking accuracy while minimizing energy consumption. Simulation results validate its effective performance for target tracking in wireless sensor networks.

  8. DRDT: Distributed and Reliable Data Transmission with Cooperative Nodes for LossyWireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jaewan Seo

    2010-03-01

    Full Text Available Recent studies have shown that in realistic wireless sensor network environments links are extremely unreliable. To recover from corrupted packets, most routing schemes with an assumption of ideal radio environments use a retransmission mechanism, which may cause unnecessary retransmissions. Therefore, guaranteeing energy-efficient reliable data transmission is a fundamental routing issue in wireless sensor networks. However, it is not encouraged to propose a new reliable routing scheme in the sense that every existing routing scheme cannot be replaced with the new one. This paper proposes a Distributed and Reliable Data Transmission (DRDT scheme with a goal to efficiently guarantee reliable data transmission. In particular, this is based on a pluggable modular approach so that it can be extended to existing routing schemes. DRDT offers reliable data transmission using neighbor nodes, i.e., helper nodes. A helper node is selected among the neighbor nodes of the receiver node which overhear the data packet in a distributed manner. DRDT effectively reduces the number of retransmissions by delegating the retransmission task from the sender node to the helper node that has higher link quality to the receiver node when the data packet reception fails due to the low link quality between the sender and the receiver nodes. Comprehensive simulation results show that DRDT improves end-to-end transmission cost by up to about 45% and reduces its delay by about 40% compared to existing schemes.

  9. Cooperating Mobile GIS and Wireless Sensor Networks for Managing Transportation Infrastructures in Urban areas

    Directory of Open Access Journals (Sweden)

    R. Shad

    2013-10-01

    Full Text Available Time management is a major subject which, in order to optimize trip conditions, emphasizes on interpreting processes and classifying individual's information. In this paper, with the aim of providing an optimal system for urban commuting in proper time in Mashhad, each user using SMS and introducing some of his/her mental priorities to the system, will be able to select the best option depending on the timing of movement of the available public transport system. The present study adopts a newly developed method of time management which is evaluated for urban transportation considering dynamic conditions of a spatial database. For this purpose, regarding time management, processed data such as bus lines, taxi networks, and the subway system are combined in a spatial framework of a designed Mobile GIS based on a wireless network. So, multiple potential paths which end to a desirable destination.

  10. A Novel Cache Resolution Technique for Cooperative Caching in Wireless Mobile Networks

    Directory of Open Access Journals (Sweden)

    Preetha Theresa Joy

    2013-05-01

    Full Text Available Cooperative caching is used in mobile ad hoc networ ks to reduce the latency perceived by the mobile clients while retrieving data and to reduce the traffic load in the network. Caching also increases the availability of data due to server di sconnections. The implementation of a cooperative caching technique essentially involves four major design considerations (i cache placement and resolution, which decides where to pl ace and how to locate the cached data (ii Cache admission control which decides the data to b e cached (iii Cache replacement which makes the replacement decision when the cache is fu ll and (iv consistency maintenance, i.e. maintaining consistency between the data in server and cache. In this paper we propose an effective cache resolution technique, which reduces the number of messages flooded in to the network to find the requested data. The experimenta l results gives a promising result based on the metrics of studies.

  11. A Novel Wireless Power Transfer-Based Weighed Clustering Cooperative Spectrum Sensing Method for Cognitive Sensor Networks.

    Science.gov (United States)

    Liu, Xin

    2015-10-30

    In a cognitive sensor network (CSN), the wastage of sensing time and energy is a challenge to cooperative spectrum sensing, when the number of cooperative cognitive nodes (CNs) becomes very large. In this paper, a novel wireless power transfer (WPT)-based weighed clustering cooperative spectrum sensing model is proposed, which divides all the CNs into several clusters, and then selects the most favorable CNs as the cluster heads and allows the common CNs to transfer the received radio frequency (RF) energy of the primary node (PN) to the cluster heads, in order to supply the electrical energy needed for sensing and cooperation. A joint resource optimization is formulated to maximize the spectrum access probability of the CSN, through jointly allocating sensing time and clustering number. According to the resource optimization results, a clustering algorithm is proposed. The simulation results have shown that compared to the traditional model, the cluster heads of the proposed model can achieve more transmission power and there exists optimal sensing time and clustering number to maximize the spectrum access probability.

  12. Joint Cooperation and Multi-Hopping Increase the Capacity of Wireless Networks

    CERN Document Server

    Vakil, Sam

    2008-01-01

    The problem of communication among nodes in an \\emph{extended network} is considered, where radio power decay and interference are limiting factors. It has been shown previously that, with simple multi-hopping, the achievable total communication rate in such a network is at most $\\Theta(\\sqrt{N})$. In this work, we study the benefit of node cooperation in conjunction with multi-hopping on the network capacity. We propose a multi-phase communication scheme, combining distributed MIMO transmission with multi-hop forwarding among clusters of nodes. We derive the network throughput of this communication scheme and determine the optimal cluster size. This provides a constructive lower bound on the network capacity. We first show that in \\textit{regular networks} a rate of $\\omega(N^{{2/3}})$ can be achieved with transmission power scaling of $\\Theta(N^{\\frac{\\alpha}{6}-{1/3}})$, where $\\alpha>2$ is the signal path-loss exponent. We further extend this result to \\textit{random networks}, where we show a rate of $\\o...

  13. Coalition Games with Cooperative Transmission: A Cure for the Curse of Boundary Nodes in Selfish Packet-Forwarding Wireless Networks

    CERN Document Server

    Han, Zhu

    2008-01-01

    In wireless packet-forwarding networks with selfish nodes, application of a repeated game can induce the nodes to forward each others' packets, so that the network performance can be improved. However, the nodes on the boundary of such networks cannot benefit from this strategy, as the other nodes do not depend on them. This problem is sometimes known as {\\em the curse of the boundary nodes}. To overcome this problem, an approach based on coalition games is proposed, in which the boundary nodes can use cooperative transmission to help the backbone nodes in the middle of the network. In return, the backbone nodes are willing to forward the boundary nodes' packets. Here, the concept of core is used to study the stability of the coalitions in such games. Then three types of fairness are investigated, namely, min-max fairness using nucleolus, average fairness using the Shapley function, and a newly proposed market fairness. Based on the specific problem addressed in this paper, market fairness is a new fairness c...

  14. Coalition Games with Cooperative Transmission: A Cure for the Curse of Boundary Nodes in Selfish Packet-Forwarding Wireless Networks

    CERN Document Server

    Han, Zhu

    2007-01-01

    In wireless packet-forwarding networks with selfish nodes, applications of a repeated game can induce the nodes to forward each others' packets, so that the network performance can be improved. However, the nodes on the boundary of such networks cannot benefit from this strategy, as the other nodes do not depend on them. This problem is sometimes known as the curse of the boundary nodes. To overcome this problem, an approach based on coalition games is proposed, in which the boundary nodes can use cooperative transmission to help the backbone nodes in the middle of the network. In return, the backbone nodes are willing to forward the boundary nodes' packets. The stability of the coalitions is studied using the concept of a core. Then two types of fairness, namely, the min-max fairness using nucleolus and the average fairness using the Shapley function are investigated. Finally, a protocol is designed using both repeated games and coalition games. Simulation results show how boundary nodes and backbone nodes f...

  15. Outage Performance Analysis of Relay Selection Schemes in Wireless Energy Harvesting Cooperative Networks over Non-Identical Rayleigh Fading Channels †

    Science.gov (United States)

    Do, Nhu Tri; Bao, Vo Nguyen Quoc; An, Beongku

    2016-01-01

    In this paper, we study relay selection in decode-and-forward wireless energy harvesting cooperative networks. In contrast to conventional cooperative networks, the relays harvest energy from the source’s radio-frequency radiation and then use that energy to forward the source information. Considering power splitting receiver architecture used at relays to harvest energy, we are concerned with the performance of two popular relay selection schemes, namely, partial relay selection (PRS) scheme and optimal relay selection (ORS) scheme. In particular, we analyze the system performance in terms of outage probability (OP) over independent and non-identical (i.n.i.d.) Rayleigh fading channels. We derive the closed-form approximations for the system outage probabilities of both schemes and validate the analysis by the Monte-Carlo simulation. The numerical results provide comprehensive performance comparison between the PRS and ORS schemes and reveal the effect of wireless energy harvesting on the outage performances of both schemes. Additionally, we also show the advantages and drawbacks of the wireless energy harvesting cooperative networks and compare to the conventional cooperative networks. PMID:26927119

  16. Wireless mesh networks

    CERN Document Server

    Held, Gilbert

    2005-01-01

    Wireless mesh networking is a new technology that has the potential to revolutionize how we access the Internet and communicate with co-workers and friends. Wireless Mesh Networks examines the concept and explores its advantages over existing technologies. This book explores existing and future applications, and examines how some of the networking protocols operate.The text offers a detailed analysis of the significant problems affecting wireless mesh networking, including network scale issues, security, and radio frequency interference, and suggests actual and potential solutions for each pro

  17. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  18. Cooperative Proxy Caching for Wireless Base Stations

    Directory of Open Access Journals (Sweden)

    James Z. Wang

    2007-01-01

    Full Text Available This paper proposes a mobile cache model to facilitate the cooperative proxy caching in wireless base stations. This mobile cache model uses a network cache line to record the caching state information about a web document for effective data search and cache space management. Based on the proposed mobile cache model, a P2P cooperative proxy caching scheme is proposed to use a self-configured and self-managed virtual proxy graph (VPG, independent of the underlying wireless network structure and adaptive to the network and geographic environment changes, to achieve efficient data search, data cache and date replication. Based on demand, the aggregate effect of data caching, searching and replicating actions by individual proxy servers automatically migrates the cached web documents closer to the interested clients. In addition, a cache line migration (CLM strategy is proposed to flow and replicate the heads of network cache lines of web documents associated with a moving mobile host to the new base station during the mobile host handoff. These replicated cache line heads provide direct links to the cached web documents accessed by the moving mobile hosts in the previous base station, thus improving the mobile web caching performance. Performance studies have shown that the proposed P2P cooperative proxy caching schemes significantly outperform existing caching schemes.

  19. Cooperative Transmission in Mobile Wireless Sensor Networks with Multiple Carrier Frequency Offsets: A Double-Differential Approach

    Directory of Open Access Journals (Sweden)

    Kun Zhao

    2014-01-01

    Full Text Available As a result of the rapidly increasing mobility of sensor nodes, mobile wireless sensor networks (MWSNs would be subject to multiple carrier frequency offsets (MCFOs, which result in time-varying channels and drastically degrade the network performance. To enhance the performance of such MWSNs, we propose a relay selection (RS based double-differential (DD cooperative transmission scheme, termed RSDDCT, in which the best relay sensor node is selected to forward the source sensor node’s signals to the destination sensor node with the detect-and-forward (DetF protocol. Assuming a Rayleigh fading environment, first, exact closed-form expressions for the outage probability and average bit error rate (BER of the RSDDCT scheme are derived. Then, simple and informative asymptotic outage probability and average BER expressions at the large signal-to-noise ratio (SNR regime are presented, which reveal that the RSDDCT scheme can achieve full diversity. Furthermore, the optimum power allocation strategy in terms of minimizing the average BER is investigated, and simple analytical solutions are obtained. Simulation results demonstrate that the proposed RSDDCT scheme can achieve excellent performance over fading channels in the presence of unknown random MCFOs. It is also shown that the proposed optimum power allocation strategy offers substantial average BER performance improvement over the equal power allocation strategy.

  20. An Immune Cooperative Particle Swarm Optimization Algorithm for Fault-Tolerant Routing Optimization in Heterogeneous Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yifan Hu

    2012-01-01

    Full Text Available The fault-tolerant routing problem is important consideration in the design of heterogeneous wireless sensor networks (H-WSNs applications, and has recently been attracting growing research interests. In order to maintain k disjoint communication paths from source sensors to the macronodes, we present a hybrid routing scheme and model, in which multiple paths are calculated and maintained in advance, and alternate paths are created once the previous routing is broken. Then, we propose an immune cooperative particle swarm optimization algorithm (ICPSOA in the model to provide the fast routing recovery and reconstruct the network topology for path failure in H-WSNs. In the ICPSOA, mutation direction of the particle is determined by multi-swarm evolution equation, and its diversity is improved by immune mechanism, which can enhance the capacity of global search and improve the converging rate of the algorithm. Then we validate this theoretical model with simulation results. The results indicate that the ICPSOA-based fault-tolerant routing protocol outperforms several other protocols due to its capability of fast routing recovery mechanism, reliable communications, and prolonging the lifetime of WSNs.

  1. Green heterogeneous wireless networks

    CERN Document Server

    Ismail, Muhammad; Nee, Hans-Peter; Qaraqe, Khalid A; Serpedin, Erchin

    2016-01-01

    This book focuses on the emerging research topic "green (energy efficient) wireless networks" which has drawn huge attention recently from both academia and industry. This topic is highly motivated due to important environmental, financial, and quality-of-experience (QoE) considerations. Specifically, the high energy consumption of the wireless networks manifests in approximately 2% of all CO2 emissions worldwide. This book presents the authors’ visions and solutions for deployment of energy efficient (green) heterogeneous wireless communication networks. The book consists of three major parts. The first part provides an introduction to the "green networks" concept, the second part targets the green multi-homing resource allocation problem, and the third chapter presents a novel deployment of device-to-device (D2D) communications and its successful integration in Heterogeneous Networks (HetNets). The book is novel in that it specifically targets green networking in a heterogeneous wireless medium, which re...

  2. Wireless rechargeable sensor networks

    CERN Document Server

    Yang, Yuanyuan

    2015-01-01

    This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability

  3. Wireless network pricing

    CERN Document Server

    Huang, Jianwei

    2013-01-01

    Today's wireless communications and networking practices are tightly coupled with economic considerations, to the extent that it is almost impossible to make a sound technology choice without understanding the corresponding economic implications. This book aims at providing a foundational introduction on how microeconomics, and pricing theory in particular, can help us to understand and build better wireless networks. The book can be used as lecture notes for a course in the field of network economics, or a reference book for wireless engineers and applied economists to understand how pricing

  4. A New Cooperative MIMO Scheme Based on SM for Energy-Efficiency Improvement in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Yuyang Peng

    2014-01-01

    Full Text Available Improving the energy efficiency in wireless sensor networks (WSN has attracted considerable attention nowadays. The multiple-input multiple-output (MIMO technique has been proved as a good candidate for improving the energy efficiency, but it may not be feasible in WSN which is due to the size limitation of the sensor node. As a solution, the cooperative multiple-input multiple-output (CMIMO technique overcomes this constraint and shows a dramatically good performance. In this paper, a new CMIMO scheme based on the spatial modulation (SM technique named CMIMO-SM is proposed for energy-efficiency improvement. We first establish the system model of CMIMO-SM. Based on this model, the transmission approach is introduced graphically. In order to evaluate the performance of the proposed scheme, a detailed analysis in terms of energy consumption per bit of the proposed scheme compared with the conventional CMIMO is presented. Later, under the guide of this new scheme we extend our proposed CMIMO-SM to a multihop clustered WSN for further achieving energy efficiency by finding an optimal hop-length. Equidistant hop as the traditional scheme will be compared in this paper. Results from the simulations and numerical experiments indicate that by the use of the proposed scheme, significant savings in terms of total energy consumption can be achieved. Combining the proposed scheme with monitoring sensor node will provide a good performance in arbitrary deployed WSN such as forest fire detection system.

  5. A new cooperative MIMO scheme based on SM for energy-efficiency improvement in wireless sensor network.

    Science.gov (United States)

    Peng, Yuyang; Choi, Jaeho

    2014-01-01

    Improving the energy efficiency in wireless sensor networks (WSN) has attracted considerable attention nowadays. The multiple-input multiple-output (MIMO) technique has been proved as a good candidate for improving the energy efficiency, but it may not be feasible in WSN which is due to the size limitation of the sensor node. As a solution, the cooperative multiple-input multiple-output (CMIMO) technique overcomes this constraint and shows a dramatically good performance. In this paper, a new CMIMO scheme based on the spatial modulation (SM) technique named CMIMO-SM is proposed for energy-efficiency improvement. We first establish the system model of CMIMO-SM. Based on this model, the transmission approach is introduced graphically. In order to evaluate the performance of the proposed scheme, a detailed analysis in terms of energy consumption per bit of the proposed scheme compared with the conventional CMIMO is presented. Later, under the guide of this new scheme we extend our proposed CMIMO-SM to a multihop clustered WSN for further achieving energy efficiency by finding an optimal hop-length. Equidistant hop as the traditional scheme will be compared in this paper. Results from the simulations and numerical experiments indicate that by the use of the proposed scheme, significant savings in terms of total energy consumption can be achieved. Combining the proposed scheme with monitoring sensor node will provide a good performance in arbitrary deployed WSN such as forest fire detection system.

  6. Architecture of Wireless Network

    Directory of Open Access Journals (Sweden)

    Ram Kumar Singh

    2012-03-01

    Full Text Available To allow for wireless communications among a specific geographic area, an base stations of communication network must be deployed to allow sufficient radio coverage to every mobile users. The base stations, successively, must be linked to a central hub called the MSC (mobile switching centre. The mobile switching centre allow connectivity among the PSTN (public switched telephone network and the numerous wireless base stations, and finally among entirely of the wireless subscribers in a system. The global telecommunications control grid of PSTN which associate with conventional (landline telephone switching centre (called central office with MSCs all around the world.

  7. Multi-hop Cooperative Wireless Networks: Diversity Multiplexing Tradeoff and Optimal Code Design

    CERN Document Server

    Sreeram, K; Kumar, P Vijay

    2008-01-01

    We consider single-source single-sink (ss-ss) multi-hop networks, with slow-fading links and single-antenna half-duplex relays. We identify two families of networks that are multi-hop generalizations of the well-studied two-hop network: K-Parallel-Path (KPP) networks and layered networks. KPP networks can be viewed as the union of K node-disjoint parallel relaying paths, each of length greater than one. KPP networks are then generalized to KPP(I) networks, which permit interference between paths and to KPP(D) networks, which possess a direct link from source to sink. We characterize the DMT of these families of networks completely for K > 3. Layered networks are networks comprising of relaying layers with edges existing only within the same layer or between adjacent layers. We prove that a linear DMT between the maximum diversity d_{max} and the maximum multiplexing gain of 1 is achievable for fully-connected layered networks. This is shown to be equal to the optimal DMT if the number of layers is less than 4...

  8. Sustainable wireless networks

    CERN Document Server

    Zheng, Zhongming; Xuemin

    2013-01-01

    This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy. The characteristics of green energy and investigating existing energy-efficient green approaches for wireless networks with sustainable energy is covered in the first part of this brief. The book then addresses the random availability and capacity of the energy supply. The authors explore how to maximize the energy sustainability of the network and minimize the failure probability that the mesh access points (APs) could deplete their

  9. Wireless nanosensor network system

    Science.gov (United States)

    Oh, Sechang; Kwon, Hyukjun; Kegley, Lauren; Yoon, Hargsoon; Varadan, Vijay K.

    2009-03-01

    Many types of wireless modules are being developed to enhance wireless performance with low power consumption, compact size, high data rates, and wide range coverage. However trade-offs must be taken into consideration in order to satisfy all aspects of wireless performance. For example, in order to increase the data rate and wide range coverage, power consumption should be sacrificed. To overcome these drawbacks, the paper presents a wireless client module which offers low power consumption along with a wireless receiver module that has the strength to provide high data rates and wide range coverage. Adopting Zigbee protocol in the wireless client module, the power consumption performance is enhanced so that it plays a part of the mobile device. On the other hand, the wireless receiver module, as adopting Zigbee and Wi-Fi protocol, provides high data rate, wide range coverage, and easy connection to the existing Internet network so that it plays a part of the portable device. This module demonstrates monitoring of gait analysis. The results show that the sensing data being measured can be monitored in any remote place with access to the Internet network.

  10. Energy efficiency in wireless networks

    CERN Document Server

    Jumira, Oswald

    2013-01-01

    The last decade has witnessed an unprecedented development and growth in global wireless communications systems, technologies and network "traffic" generated over network infrastructures.This book presents state-of-the-art energy-efficient techniques, designs and implementations that pertain to wireless communication networks such as cellular networks, wireless local area networks (WLANs) and wireless ad hoc networks (WAHNs) including mobile ad hoc networks (MANETs), and wireless sensor networks (WSNs) as they are deployed across the world to facilitate "always on" reliable high-speed

  11. Research in Wireless Networks and Communications

    Science.gov (United States)

    2008-05-01

    mesh networks with British Telecom and other organizations. They use APs equipped with smart antennas and integrated routers . [2] Consider a set of...193. [15] Thomson , J., Baas, B., Cooper, E. M., Gilbert, J. M., Hsieh, G., Husted, P., Lokanathan, A., Kuskin, J. S., McCracken, D., McFarland, B., Meng...Radio Mesh Networking Testbed,” 1st workshop on Wireless Network Measurements (WiNMee 2005), Trento, Italy, April 2005 [20] Thomson , J., Baas, B., Cooper

  12. Miniaturized wireless sensor network

    CERN Document Server

    Lecointre, Aubin; Dubuc, David; Katia, Grenier; Patrick, Pons; Aubert, Hervé; Muller, A; Berthou, Pascal; Gayraud, Thierry; Plana, Robert

    2010-01-01

    This paper addresses an overview of the wireless sensor networks. It is shown that MEMS/NEMS technologies and SIP concept are well suited for advanced architectures. It is also shown analog architectures have to be compatible with digital signal techniques to develop smart network of microsystem.

  13. Wireless Sensors Network (Sensornet)

    Science.gov (United States)

    Perotti, J.

    2003-01-01

    The Wireless Sensor Network System presented in this paper provides a flexible reconfigurable architecture that could be used in a broad range of applications. It also provides a sensor network with increased reliability; decreased maintainability costs, and assured data availability by autonomously and automatically reconfiguring to overcome communication interferences.

  14. Wireless networked music performance

    CERN Document Server

    Gabrielli, Leonardo

    2016-01-01

    This book presents a comprehensive overview of the state of the art in Networked Music Performance (NMP) and a historical survey of computer music networking. It introduces current technical trends in NMP and technical issues yet to be addressed. It also lists wireless communication protocols and compares these to the requirements of NMP. Practical use cases and advancements are also discussed.

  15. Optimizing the Number of Cooperating Terminals for Energy Aware Task Computing in Wireless Networks

    DEFF Research Database (Denmark)

    Olsen, Anders Brødløs; Fitzek, Frank H. P.; Koch, Peter

    2005-01-01

    It is generally accepted that energy consumption is a significant design constraint for mobile handheld systems, therefore motivations for methods optimizing the energy consumption making better use of the restricted battery resources are evident. A novel concept of distributed task computing...... consumption of the terminals with respect to their workload and the overhead of distributing tasks among terminals are taken into account. The paper shows, that the number of cooperating terminals is in general limited to a few, though alternating with respect to the various system parameters....

  16. BLIND CHANNEL AND SYMBOL JOINT ESTIMATION IN COOPERATIVE MIMO FOR WIRELESS SENSOR NETWORK

    Institute of Scientific and Technical Information of China (English)

    Yan Zhenya; Zheng Baoyu

    2008-01-01

    In this paper, application of Sequential Quasi Monte Carlo (SQMC) to blind channel and symbol joint estimation in cooperative Multiple-Input Multiple-Output (MIMO) system is proposed, which does not need to transmit training symbol and can save the power and channel bandwidth. Additionally, an improved version of SQMC algorithm by taking advantage of current received signal is discussed. Simulation results show that the SQMC method outperforms the Sequential Monte Carlo (SMC) methods, and the incorporation of current received signal improves the performance of the SQMC obviously.

  17. Evolution of Heterogeneous Wireless Networks

    DEFF Research Database (Denmark)

    Zhang, Q.; Fitzek, Frank; Katz, Marcos

    2006-01-01

    Mobile and wireless content, services and networks - Short-term and long-term development trends......Mobile and wireless content, services and networks - Short-term and long-term development trends...

  18. Resource Allocation and Interference Mitigation Techniques for Cooperative Multi-Antenna and Spread Spectrum Wireless Networks

    OpenAIRE

    Clarke, Patrick; Rodrigo C. de Lamare

    2013-01-01

    This chapter presents joint interference suppression and power allocation algorithms for DS-CDMA and MIMO networks with multiple hops and amplify-and-forward and decode-and-forward (DF) protocols. A scheme for joint allocation of power levels across the relays and linear interference suppression is proposed. We also consider another strategy for joint interference suppression and relay selection that maximizes the diversity available in the system. Simulations show that the proposed cross-lay...

  19. Interference Cancellation at the Relay for Multi-User Wireless Cooperative Networks

    OpenAIRE

    Li, Liangbin; Jing, Yindi; Jafarkhani, Hamid

    2010-01-01

    We study multi-user transmission and detection schemes for a multi-access relay network (MARN) with linear constraints at all nodes. In a $(J, J_a, R_a, M)$ MARN, $J$ sources, each equipped with $J_a$ antennas, communicate to one $M$-antenna destination through one $R_a$-antenna relay. A new protocol called IC-Relay-TDMA is proposed which takes two phases. During the first phase, symbols of different sources are transmitted concurrently to the relay. At the relay, interference cancellation (I...

  20. Proxy SDN Controller for Wireless Networks

    Directory of Open Access Journals (Sweden)

    Won-Suk Kim

    2016-01-01

    Full Text Available Management of wireless networks as well as wired networks by using software-defined networking (SDN has been highlighted continually. However, control features of a wireless network differ from those of a wired network in several aspects. In this study, we identify the various inefficient points when controlling and managing wireless networks by using SDN and propose SDN-based control architecture called Proxcon to resolve these problems. Proxcon introduces the concept of a proxy SDN controller (PSC for the wireless network control, and the PSC entrusted with the role of a main controller performs control operations and provides the latest network state for a network administrator. To address the control inefficiency, Proxcon supports offloaded SDN operations for controlling wireless networks by utilizing the PSC, such as local control by each PSC, hybrid control utilizing the PSC and the main controller, and locally cooperative control utilizing the PSCs. The proposed architecture and the newly supported control operations can enhance scalability and response time when the logically centralized control plane responds to the various wireless network events. Through actual experiments, we verified that the proposed architecture could address the various control issues such as scalability, response time, and control overhead.

  1. Resource management in wireless networking

    CERN Document Server

    Cardei, Mihaela; Du, Ding-Zhu

    2005-01-01

    This is the first book that provides readers with a deep technical overview of recent advances in resource management for wireless networks at different layers of the protocol stack. The subject is explored in various wireless networks, such as ad hoc wireless networks, 3G/4G cellular, IEEE 802.11, and Bluetooth personal area networks.Survey chapters give an excellent introduction to key topics in resource management for wireless networks, while experts will be satisfied by the technical depth of the knowledge imparted in chapters exploring hot research topics.The subject area discussed in this book is very relevant today, considering the recent remarkable growth of wireless networking and the convergence of wireless personal communications, internet technologies and real-time multimedia.This volume is a very good companion for practitioners working on implementing solutions for multimedia and Quality of Service - sensitive applications over wireless networks.Written for:Researchers, faculty members, students...

  2. Insecurity of Wireless Networks

    Energy Technology Data Exchange (ETDEWEB)

    Sheldon, Frederick T [ORNL; Weber, John Mark [Dynetics, Inc.; Yoo, Seong-Moo [University of Alabama, Huntsville; Pan, W. David [University of Alabama, Huntsville

    2012-01-01

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA, allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.

  3. Approximately universal, explicit DMT-optimal constructions for the dynamic-decode-and-forward cooperative wireless relay network

    CERN Document Server

    Elia, Petros

    2007-01-01

    Explicit codes are constructed that achieve the diversity-multiplexing gain tradeoff of the cooperative-relay channel under the dynamic decode-and-forward protocol for any network size, for all delays and for all numbers of transmit and receive antennas at the relays.

  4. Caching in Wireless Networks

    CERN Document Server

    Niesen, Urs; Wornell, Gregory

    2009-01-01

    We consider the problem of delivering content cached in a wireless network of $n$ nodes randomly located on a square of area $n$. In the most general form, this can be analyzed by considering the $2^n\\times n$-dimensional caching capacity region of the wireless network. We provide an inner bound on this caching capacity region and, in the high path-loss regime, a matching (in the scaling sense) outer bound. For large path-loss exponent, this provides an information-theoretic scaling characterization of the entire caching capacity region. Moreover, the proposed communication scheme achieving the inner bound shows that the problem of cache selection and channel coding can be solved separately without loss of order-optimality.

  5. Cognitive wireless networks

    CERN Document Server

    Feng, Zhiyong; Zhang, Ping

    2015-01-01

    This brief examines the current research in cognitive wireless networks (CWNs). Along with a review of challenges in CWNs, this brief presents novel theoretical studies and architecture models for CWNs, advances in the cognitive information awareness and delivery, and intelligent resource management technologies. The brief presents the motivations and concepts of CWNs, including theoretical studies of temporal and geographic distribution entropy as well as cognitive information metrics. A new architecture model of CWNs is proposed with theoretical, functional and deployment architectures suppo

  6. Wireless Network Security Using Randomness

    Science.gov (United States)

    2012-06-19

    decision, unless so designated by other documentation. 12. DISTRIBUTION AVAILIBILITY STATEMENT Approved for public release; distribution is unlimited. UU...connectivity with the wireless network and the highly dynamic connections between nodes rule out the use of complex key distribution methods and make...Protected Access ( WPA and WPA2). WEP is a scheme used to secure IEEE 802.11 wireless networks, and is part of the IEEE 802.11 wireless networking standard

  7. A Novel Two-Tier Cooperative Caching Mechanism for the Optimization of Multi-Attribute Periodic Queries in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    ZhangBing Zhou

    2015-06-01

    Full Text Available Wireless sensor networks, serving as an important interface between physical environments and computational systems, have been used extensively for supporting domain applications, where multiple-attribute sensory data are queried from the network continuously and periodically. Usually, certain sensory data may not vary significantly within a certain time duration for certain applications. In this setting, sensory data gathered at a certain time slot can be used for answering concurrent queries and may be reused for answering the forthcoming queries when the variation of these data is within a certain threshold. To address this challenge, a popularity-based cooperative caching mechanism is proposed in this article, where the popularity of sensory data is calculated according to the queries issued in recent time slots. This popularity reflects the possibility that sensory data are interested in the forthcoming queries. Generally, sensory data with the highest popularity are cached at the sink node, while sensory data that may not be interested in the forthcoming queries are cached in the head nodes of divided grid cells. Leveraging these cooperatively cached sensory data, queries are answered through composing these two-tier cached data. Experimental evaluation shows that this approach can reduce the network communication cost significantly and increase the network capability.

  8. Wireless Networks: New Meaning to Ubiquitous Computing.

    Science.gov (United States)

    Drew, Wilfred, Jr.

    2003-01-01

    Discusses the use of wireless technology in academic libraries. Topics include wireless networks; standards (IEEE 802.11); wired versus wireless; why libraries implement wireless technology; wireless local area networks (WLANs); WLAN security; examples of wireless use at Indiana State University and Morrisville College (New York); and useful…

  9. Robust resource allocation in future wireless networks

    CERN Document Server

    Parsaeefard, Saeedeh; Mokari, Nader

    2017-01-01

    This book presents state-of-the-art research on robust resource allocation in current and future wireless networks. The authors describe the nominal resource allocation problems in wireless networks and explain why introducing robustness in such networks is desirable. Then, depending on the objectives of the problem, namely maximizing the social utility or the per-user utility, cooperative or competitive approaches are explained and their corresponding robust problems are considered in detail. For each approach, the costs and benefits of robust schemes are discussed and the algorithms for reducing their costs and improving their benefits are presented. Considering the fact that such problems are inherently non-convex and intractable, a taxonomy of different relaxation techniques is presented, and applications of such techniques are shown via several examples throughout the book. Finally, the authors argue that resource allocation continues to be an important issue in future wireless networks, and propose spec...

  10. Views of wireless network systems.

    Energy Technology Data Exchange (ETDEWEB)

    Young, William Frederick; Duggan, David Patrick

    2003-10-01

    Wireless networking is becoming a common element of industrial, corporate, and home networks. Commercial wireless network systems have become reliable, while the cost of these solutions has become more affordable than equivalent wired network solutions. The security risks of wireless systems are higher than wired and have not been studied in depth. This report starts to bring together information on wireless architectures and their connection to wired networks. We detail information contained on the many different views of a wireless network system. The method of using multiple views of a system to assist in the determination of vulnerabilities comes from the Information Design Assurance Red Team (IDART{trademark}) Methodology of system analysis developed at Sandia National Laboratories.

  11. Wireless sensor networks architectures and protocols

    CERN Document Server

    Callaway, Jr, Edgar H

    2003-01-01

    Introduction to Wireless Sensor NetworksApplications and MotivationNetwork Performance ObjectivesContributions of this BookOrganization of this BookThe Development of Wireless Sensor NetworksEarly Wireless NetworksWireless Data NetworksWireless Sensor and Related NetworksConclusionThe Physical LayerSome Physical Layer ExamplesA Practical Physical Layer for Wireless Sensor NetworksSimulations and ResultsConclusionThe Data Link LayerMedium Access Control TechniquesThe Mediation DeviceSystem Analysis and SimulationConclusionThe Network LayerSome Network Design ExamplesA Wireless Sensor Network De

  12. Optimal Cooperative Relaying Schemes for Improving Wireless Physical Layer Security

    CERN Document Server

    Li, Jiangyuan; Weber, Steven

    2010-01-01

    We consider a cooperative wireless network in the presence of one of more eavesdroppers, and exploit node cooperation for achieving physical (PHY) layer based security. Two different cooperation schemes are considered. In the first scheme, cooperating nodes retransmit a weighted version of the source signal in a decode-and-forward (DF) fashion. In the second scheme, while the source is transmitting, cooperating nodes transmit weighted noise to confound the eavesdropper (cooperative jamming (CJ)). We investigate two objectives, i.e., maximization of achievable secrecy rate subject to a total power constraint, and minimization of total power transmit power under a secrecy rate constraint. For the first design objective with a single eavesdropper we obtain expressions for optimal weights under the DF protocol in closed form, and give an algorithm that converges to the optimal solution for the CJ scheme; while for multiple eavesdroppers we give an algorithm for the solution using the DF protocol that is guarantee...

  13. COOPERATIVE ARQ PROTOCOL FOR CORRELATED WIRELESS CHANNELS

    Institute of Scientific and Technical Information of China (English)

    Yu Guanding; Zhang Zhaoyang; Qiu Peiliang

    2006-01-01

    A novel Automatic repeat ReQuest (ARQ) protocol called cooperative ARQ is presented in this letter, where a relay terminal is requested to retransmit an erroneously received packet, instead of the source terminal. The data link layer Packet Error Rate (PER) performance of cooperative ARQ is derived in correlated wireless channel. The results show that even though the relay-destination channel is worse than the sourcedestination channel, the new protocol outperforms the traditional one as long as the average SNR of the relaydestination channel is better than a certain threshold. It is also demonstrated that a second order diversity gain can be achieved with the cooperative ARQ protocol.

  14. Overlapping coalition formation games in wireless communication networks

    CERN Document Server

    Wang, Tianyu; Saad, Walid; Han, Zhu

    2017-01-01

    This brief introduces overlapping coalition formation games (OCF games), a novel mathematical framework from cooperative game theory that can be used to model, design and analyze cooperative scenarios in future wireless communication networks. The concepts of OCF games are explained, and several algorithmic aspects are studied. In addition, several major application scenarios are discussed. These applications are drawn from a variety of fields that include radio resource allocation in dense wireless networks, cooperative spectrum sensing for cognitive radio networks, and resource management for crowd sourcing. For each application, the use of OCF games is discussed in detail in order to show how this framework can be used to solve relevant wireless networking problems. Overlapping Coalition Formation Games in Wireless Communication Networks provides researchers, students and practitioners with a concise overview of existing works in this emerging area, exploring the relevant fundamental theories, key techniqu...

  15. Cooperative robots and sensor networks 2014

    CERN Document Server

    Khelil, Abdelmajid

    2014-01-01

    This book is the second volume on Cooperative Robots and Sensor Networks. The primary objective of this book is to provide an up-to-date reference for cutting-edge studies and research trends related to mobile robots and wireless sensor networks, and in particular for the coupling between them. Indeed, mobile robots and wireless sensor networks have enabled great potentials and a large space for ubiquitous and pervasive applications. Robotics and wireless sensor networks have mostly been considered as separate research fields and little work has investigated the marriage between these two technologies. However, these two technologies share several features, enable common cyber-physical applications and provide complementary support to each other. The book consists of ten chapters, organized into four parts. The first part of the book presents three chapters related to localization of mobile robots using wireless sensor networks. Two chapters presented new solutions based Extended Kalman Filter and Particle Fi...

  16. Network Coding Opportunities for Wireless Grids Formed by Mobile Devices

    DEFF Research Database (Denmark)

    Nielsen, Karsten Fyhn; Madsen, Tatiana Kozlova; Fitzek, Frank

    2008-01-01

    link should be taken into account. We focus on the question how nodes can efficiently communicate and distribute data in a wireless grid. We show the potential of a network coding approach when nodes have the possibility to combine packets thus increasing the amount of information per transmission. Our......Wireless grids have potential in sharing communication, computational and storage resources making these networks more powerful, more robust, and less cost intensive. However, to enjoy the benefits of cooperative resource sharing, a number of issues should be addressed and the cost of the wireless...... implementation demonstrates the feasibility of network coding for wireless grids formed by mobile devices....

  17. Wi-Fi Wireless Networks and Technology

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Most agree that wireless networking represent the future of computer and Internet connectivity worldwide.Wi-Fi continues to be the pre-eminent technology for building general-purpose wireless networks. 1 What is Wireless Networking? Wireless networks utilize radio waves and/or microwaves to maintain communication channels between computers.Wireless net- working is a more modern alternative to wired networking that relies on copper and/or fiber optic cabling between network devices.

  18. Penetration Testing in Wireless Networks

    OpenAIRE

    Lamichhane, Shree

    2017-01-01

    This thesis illustrates the security measures and mechanisms behind the encryption and decryption of data while transmitting data in a wireless network. Furthermore, this thesis describes and demonstrates several security threats in a wireless network that are widely experienced. It also explains shortly the evolution of the widely implemented IEEE 802.11 standard and its amendments. Kali Linux tools were used to perform a penetration test in a WPA secured test network. In-formation on th...

  19. Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends

    Directory of Open Access Journals (Sweden)

    Gyanendra Prasad Joshi

    2013-08-01

    Full Text Available A cognitive radio wireless sensor network is one of the candidate areas where cognitive techniques can be used for opportunistic spectrum access. Research in this area is still in its infancy, but it is progressing rapidly. The aim of this study is to classify the existing literature of this fast emerging application area of cognitive radio wireless sensor networks, highlight the key research that has already been undertaken, and indicate open problems. This paper describes the advantages of cognitive radio wireless sensor networks, the difference between ad hoc cognitive radio networks, wireless sensor networks, and cognitive radio wireless sensor networks, potential application areas of cognitive radio wireless sensor networks, challenges and research trend in cognitive radio wireless sensor networks. The sensing schemes suited for cognitive radio wireless sensor networks scenarios are discussed with an emphasis on cooperation and spectrum access methods that ensure the availability of the required QoS. Finally, this paper lists several open research challenges aimed at drawing the attention of the readers toward the important issues that need to be addressed before the vision of completely autonomous cognitive radio wireless sensor networks can be realized.

  20. Cognitive radio wireless sensor networks: applications, challenges and research trends.

    Science.gov (United States)

    Joshi, Gyanendra Prasad; Nam, Seung Yeob; Kim, Sung Won

    2013-08-22

    A cognitive radio wireless sensor network is one of the candidate areas where cognitive techniques can be used for opportunistic spectrum access. Research in this area is still in its infancy, but it is progressing rapidly. The aim of this study is to classify the existing literature of this fast emerging application area of cognitive radio wireless sensor networks, highlight the key research that has already been undertaken, and indicate open problems. This paper describes the advantages of cognitive radio wireless sensor networks, the difference between ad hoc cognitive radio networks, wireless sensor networks, and cognitive radio wireless sensor networks, potential application areas of cognitive radio wireless sensor networks, challenges and research trend in cognitive radio wireless sensor networks. The sensing schemes suited for cognitive radio wireless sensor networks scenarios are discussed with an emphasis on cooperation and spectrum access methods that ensure the availability of the required QoS. Finally, this paper lists several open research challenges aimed at drawing the attention of the readers toward the important issues that need to be addressed before the vision of completely autonomous cognitive radio wireless sensor networks can be realized.

  1. Wireless home networking for dummies

    CERN Document Server

    Briere, Danny; Ferris, Edward

    2010-01-01

    The perennial bestseller shows you how share your files and Internet connection across a wireless network. Fully updated for Windows 7 and Mac OS X Snow Leopard, this new edition of this bestseller returns with all the latest in wireless standards and security. This fun and friendly guide shows you how to integrate your iPhone, iPod touch, smartphone, or gaming system into your home network. Veteran authors escort you through the various financial and logisitical considerations that you need to take into account before building a wireless network at home.: Covers the basics of planning, instal

  2. Cooperative Hurricane Network Obs

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Observations from the Cooperative Hurricane Reporting Network (CHURN), a special network of stations that provided observations when tropical cyclones approached the...

  3. Cooperative Search and Rescue with Artificial Fishes Based on Fish-Swarm Algorithm for Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Wei Zhao

    2014-01-01

    Full Text Available This paper presents a searching control approach for cooperating mobile sensor networks. We use a density function to represent the frequency of distress signals issued by victims. The mobile nodes’ moving in mission space is similar to the behaviors of fish-swarm in water. So, we take the mobile node as artificial fish node and define its operations by a probabilistic model over a limited range. A fish-swarm based algorithm is designed requiring local information at each fish node and maximizing the joint detection probabilities of distress signals. Optimization of formation is also considered for the searching control approach and is optimized by fish-swarm algorithm. Simulation results include two schemes: preset route and random walks, and it is showed that the control scheme has adaptive and effective properties.

  4. Green Wireless Power Transfer Networks

    NARCIS (Netherlands)

    Liu, Q.; Golinnski, M.; Pawelczak, P.; Warnier, M.

    2016-01-01

    wireless power transfer network (WPTN) aims to support devices with cable-less energy on-demand. Unfortunately, wireless power transfer itself-especially through radio frequency radiation rectification-is fairly inefficient due to decaying power with distance, antenna polarization, etc.

  5. Wireless network security theories and applications

    CERN Document Server

    Chen, Lei; Zhang, Zihong

    2013-01-01

    Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth

  6. Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Hong-Chuan Yang

    2007-01-01

    Full Text Available We study the energy-efficient configuration of multihop paths with automatic repeat request (ARQ mechanism in wireless ad hoc networks. We adopt a cross-layer design approach and take both the quality of each radio hop and the battery capacity of each transmitting node into consideration. Under certain constraints on the maximum tolerable transmission delay and the required packet delivery ratio, we solve optimization problems to jointly schedule the transmitting power of each transmitting node and the retransmission limit over each hop. Numerical results demonstrate that the path configuration methods can either significantly reduce the average energy consumption per packet delivery or considerably extend the average lifetime of the multihop route.

  7. Secure positioning in wireless networks

    DEFF Research Database (Denmark)

    Capkun, Srdjan; Hubaux, Jean-Pierre

    2006-01-01

    So far, the problem of positioning in wireless networks has been studied mainly in a non-adversarial settings. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call...... Verifiable Multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations....

  8. Interference Cancellation in Cooperative CDMA Networks

    Directory of Open Access Journals (Sweden)

    A. Rajeswari

    2011-01-01

    Full Text Available The wireless communication networks are subjected to multi access interference and multipath fading. To minimize the interference cancellation in CDMA networks, multiple user detection schemes and cooperative communication networks are used. consider the uplink of a cooperative CDMA network, where users cooperate by relaying each other’s messages to the base station. When spreading waveforms are not orthogonal, multiple access interference (MAI exists at the relays and the destination, causing cooperative diversity gains to diminish. To overcome this problem, we integrate various multiuser detection (MUD schemes to mitigate MAI in achieving the full advantages of cooperation. Specifically, the relay-assisted decorrelating multiuser detector (RADMUD is proposed to separate interfering signals at the destination with the help of precoding at the relays along with pre-whitening at the destination. In this paper we examined the BER performance of various MUD schemes are analyzed and compared with cooperative system. The advantages of RAD-MUD with co-operative communication shows better BER performance compared with non co-operative wireless communication system and other existing cooperative MUD schemes are also shown through MATLAB Simulations.

  9. Security for multi-hop wireless networks

    CERN Document Server

    Mahmoud, Mohamed M E A

    2014-01-01

    This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally. Also included is a new, efficient cooperation incentive scheme to stimulate the selfish nodes to relay information packets and enforce fairness. Many examples are provided, along with predictions for future directions of the field. Security

  10. Wireless sensor networks distributed consensus estimation

    CERN Document Server

    Chen, Cailian; Guan, Xinping

    2014-01-01

    This SpringerBrief evaluates the cooperative effort of sensor nodes to accomplish high-level tasks with sensing, data processing and communication. The metrics of network-wide convergence, unbiasedness, consistency and optimality are discussed through network topology, distributed estimation algorithms and consensus strategy. Systematic analysis reveals that proper deployment of sensor nodes and a small number of low-cost relays (without sensing function) can speed up the information fusion and thus improve the estimation capability of wireless sensor networks (WSNs). This brief also investiga

  11. Wireless Internet on Heterogeneous Networks

    NARCIS (Netherlands)

    Wu, G.

    2001-01-01

    The wide proliferation of wireless systems and the use of software radio technologies enable the employment of a heterogeneous network. In this concept services are delivered via the network that is most efficient for that service. The solution is based on a common core network that interconnects ac

  12. Introduction to wireless sensor networks

    CERN Document Server

    Forster, Anna

    2016-01-01

    Explores real-world wireless sensor network development, deployment, and applications. The book begins with an introduction to wireless sensor networks and their fundamental concepts. Hardware components, operating systems, protocols, and algorithms that make up the anatomy of a sensor node are described in chapter two. Properties of wireless communications, medium access protocols, wireless links, and link estimation protocols are described in chapter three and chapter four. Routing basics and metrics, clustering techniques, time synchronization and localization protocols, as well as sensing techniques are introduced in chapter five to nine. The concluding chapter summarizes the learnt methods and shows how to use them to deploy real-world sensor networks in a structured way.

  13. Modeling Multistandard Wireless Networks in OPNET

    DEFF Research Database (Denmark)

    Zakrzewska, Anna; Berger, Michael Stübert; Ruepp, Sarah Renée

    2011-01-01

    Future wireless communication is emerging towards one heterogeneous platform. In this new environment wireless access will be provided by multiple radio technologies that are cooperating and complementing one another. The paper investigates the possibilities of developing such a multistandard...

  14. Network modularity promotes cooperation.

    Science.gov (United States)

    Marcoux, Marianne; Lusseau, David

    2013-05-01

    Cooperation in animals and humans is widely observed even if evolutionary biology theories predict the evolution of selfish individuals. Previous game theory models have shown that cooperation can evolve when the game takes place in a structured population such as a social network because it limits interactions between individuals. Modularity, the natural division of a network into groups, is a key characteristic of all social networks but the influence of this crucial social feature on the evolution of cooperation has never been investigated. Here, we provide novel pieces of evidence that network modularity promotes the evolution of cooperation in 2-person prisoner's dilemma games. By simulating games on social networks of different structures, we show that modularity shapes interactions between individuals favouring the evolution of cooperation. Modularity provides a simple mechanism for the evolution of cooperation without having to invoke complicated mechanisms such as reputation or punishment, or requiring genetic similarity among individuals. Thus, cooperation can evolve over wider social contexts than previously reported.

  15. A Bandwidth-Efficient Cooperative Authentication and an En-route Filtering Scheme for Filtering Injected False Data in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    T.R. Yashavanth,

    2013-04-01

    Full Text Available Injecting false data attack is awell-knownseriousthreat to wireless sensor network, for which anadversary reports bogus information to sink causingerror decision at upper level and energy waste in en-route nodes. In this paper, we propose a novelbandwidth-efficient cooperative authenticationscheme for filtering injected false data. Theproposed method of BECAN can save energy byconsidering the random graph characteristics ofdeployment of sensor node and a technique forcooperative bit-compressed authentication and thismethod is done by early detection and filtering mostof injected false data at the en-route nodes withminor extra overheads. Further, it is necessary tocheck at the sink, a very small amount of injectedfalse data which largely helps to reduce burden onthe sink. For the proposed method, theoretical andsimulation results are given which shows theeffectiveness regarding high filtering and energysaving.We propose an EFSP (En-route FilteringScheme based on Priority to control the number ofvotes. The EFSP determines priorities through thefuzzy rule-based system. Base station sends priorityto the cluster head and then according to thepriority a specified number of votes are attached tothe report by the cluster head.

  16. Emerging wireless networks concepts, techniques and applications

    CERN Document Server

    Makaya, Christian

    2011-01-01

    An authoritative collection of research papers and surveys, Emerging Wireless Networks: Concepts, Techniques, and Applications explores recent developments in next-generation wireless networks (NGWNs) and mobile broadband networks technologies, including 4G (LTE, WiMAX), 3G (UMTS, HSPA), WiFi, mobile ad hoc networks, mesh networks, and wireless sensor networks. Focusing on improving the performance of wireless networks and provisioning better quality of service and quality of experience for users, it reports on the standards of different emerging wireless networks, applications, and service fr

  17. A Survey of Encroachment Disclosure in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Sushma J. Gaurkar

    2013-02-01

    Full Text Available In wireless sensor network (WSN security is the major issuebecause of its hostile nature. The traditional intrusion detectiontechnique and traditional access control will not providereliability and security if they do not work cooperatively. If thesecurity is compromised, there could be serious consequencesstarting from theft of information, loss of privacy and reachingeven bankruptcy of that institution. In this paper a brief surveyon some recent intrusion detection technique & access controlmechanism in wireless sensor network is presented anddiscusses them in detail.

  18. Joint Network Coding for Interfering Wireless Multicast Networks

    CERN Document Server

    Qureshi, Jalaluddin; Cai, Jianfei

    2011-01-01

    Interference in wireless networks is one of the key-capacity limiting factor. The multicast capacity of an ad- hoc wireless network decreases with an increasing number of transmitting and/or receiving nodes within a fixed area. Digital Network Coding (DNC) has been shown to improve the multicast capacity of non-interfering wireless network. However recently proposed Physical-layer Network Coding (PNC) and Analog Network Coding (ANC) has shown that it is possible to decode an unknown packet from the collision of two packet, when one of the colliding packet is known a priori. Taking advantage of such collision decoding scheme, in this paper we propose a Joint Network Coding based Cooperative Retransmission (JNC- CR) scheme, where we show that ANC along with DNC can offer a much higher retransmission gain than that attainable through either ANC, DNC or Automatic Repeat reQuest (ARQ) based retransmission. This scheme can be applied for two wireless multicast groups interfering with each other. Because of the broa...

  19. Wireless network cooperative routing algorithm based on location information%基于位置信息的无线网络协作路由算法

    Institute of Scientific and Technical Information of China (English)

    周雷; 苏红; 唐昊; 韩江洪

    2015-01-01

    Lifetime is one of the important performance parameter for energy-constrained wireless network, and how to extend the lifetime is a critical issue in practical applications of wireless network .Saving energy or optimizing the transmission power is one of the most common methods.For direct and cooperative transmission link, a lifetime maxi-mizing cooperative routing algorithm is proposed based on node’s location information, in which cooperative commu-nication is associated with routing mechanism.While guaranteeing the outage rate at a certain level, nonlinear pro-gramming problem is specified to obtain the optimal transmission power.Then, the link costs formula is given, which is constructed by representing transmission energy with optimal transmission power, receiving energy and node’s re-sidual energy.On the basis of the Dijkstra’s shortest path, the link costs formula is used to construct the route from source node to destination node.The simulation results show that this algorithm can reduce the transmission power and save energy consumption of nodes to extend network lifetime effectively.%网络生命周期是评价能量受限无线网络性能的重要指标之一,如何有效延长网络生命周期是影响该类无线网络实际应用的重要问题,优化发射功率或节约能耗是比较常见的解决方法之一。针对直接和协作2种传输链路,将协作通信技术与路由机制相结合,并基于节点的位置信息,提出一种最大化网络生命周期的协作路由算法。该算法在保证一定中断率的前提下,运用非线性规划方法求解最优发射功率,进而构建由节点发射能耗、接收能耗和剩余能量组成的权值代价公式。然后,基于Dijkstra’ s最短路径,依据权值代价公式建立从源节点到目的节点的协作路由。仿真实验结果表明,该算法可以降低节点的发射功率,减少节点的能量消耗,从而有效的延长网络生命周期。

  20. Securing underwater wireless communication networks

    OpenAIRE

    Domingo Aladrén, Mari Carmen

    2011-01-01

    Underwater wireless communication networks are particularly vulnerable to malicious attacks due to the high bit error rates, large and variable propagation delays, and low bandwidth of acoustic channels. The unique characteristics of the underwater acoustic communication channel, and the differences between underwater sensor networks and their ground-based counterparts require the development of efficient and reliable security mechanisms. In this article, a compl...

  1. NEURON: Enabling Autonomicity in Wireless Sensor Networks

    Science.gov (United States)

    Zafeiropoulos, Anastasios; Gouvas, Panagiotis; Liakopoulos, Athanassios; Mentzas, Gregoris; Mitrou, Nikolas

    2010-01-01

    Future Wireless Sensor Networks (WSNs) will be ubiquitous, large-scale networks interconnected with the existing IP infrastructure. Autonomic functionalities have to be designed in order to reduce the complexity of their operation and management, and support the dissemination of knowledge within a WSN. In this paper a novel protocol for energy efficient deployment, clustering and routing in WSNs is proposed that focuses on the incorporation of autonomic functionalities in the existing approaches. The design of the protocol facilitates the design of innovative applications and services that are based on overlay topologies created through cooperation among the sensor nodes. PMID:22399931

  2. NEURON: Enabling Autonomicity in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Anastasios Zafeiropoulos

    2010-05-01

    Full Text Available Future Wireless Sensor Networks (WSNs will be ubiquitous, large-scale networks interconnected with the existing IP infrastructure. Autonomic functionalities have to be designed in order to reduce the complexity of their operation and management, and support the dissemination of knowledge within a WSN. In this paper a novel protocol for energy efficient deployment, clustering and routing in WSNs is proposed that focuses on the incorporation of autonomic functionalities in the existing approaches. The design of the protocol facilitates the design of innovative applications and services that are based on overlay topologies created through cooperation among the sensor nodes.

  3. QoE management in wireless networks

    CERN Document Server

    Wang, Ying; Zhang, Ping

    2017-01-01

    This SpringerBrief presents research results on QoE management schemes for mobile services, including user services, and resource allocation. Along with a review of the research literature, it offers a data-driven architecture for personalized QoE management in wireless networks. The primary focus is on introducing efficient personalized character extraction mechanisms, e.g., context-aware Bayesian graph model, and cooperative QoE management mechanisms. Moreover, in order to demonstrate in the effectiveness of the QoE model, a QoE measurement platform is described and its collected data examined. The brief concludes with a discussion of future research directions. The example mechanisms and the data-driven architecture provide useful insights into the designs of QoE management, and motivate a new line of thinking for users' satisfaction in future wireless networks.

  4. Cooperative robots and sensor networks

    CERN Document Server

    Khelil, Abdelmajid

    2014-01-01

    Mobile robots and Wireless Sensor Networks (WSNs) have enabled great potentials and a large space for ubiquitous and pervasive applications. Robotics and WSNs have mostly been considered as separate research fields and little work has investigated the marriage between these two technologies. However, these two technologies share several features, enable common cyber-physical applications and provide complementary support to each other.
 The primary objective of book is to provide a reference for cutting-edge studies and research trends pertaining to robotics and sensor networks, and in particular for the coupling between them. The book consists of five chapters. The first chapter presents a cooperation strategy for teams of multiple autonomous vehicles to solve the rendezvous problem. The second chapter is motivated by the need to improve existing solutions that deal with connectivity prediction, and proposed a genetic machine learning approach for link-quality prediction. The third chapter presents an arch...

  5. SDN Based User-Centric Framework for Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Zhaoming Lu

    2016-01-01

    Full Text Available Due to the rapid growth of mobile data traffic, more and more basestations and access points (APs have been densely deployed to provide users with ubiquitous network access, which make current wireless network a complex heterogeneous network (HetNet. However, traditional wireless networks are designed with network-centric approaches where different networks have different quality of service (QoS strategies and cannot easily cooperate with each other to serve network users. Massive network infrastructures could not assure users perceived network and service quality, which is an indisputable fact. To address this issue, we design a new framework for heterogeneous wireless networks with the principle of user-centricity, refactoring the network from users’ perspective to suffice their requirements and preferences. Different from network-centric approaches, the proposed framework takes advantage of Software Defined Networking (SDN and virtualization technology, which will bring better perceived services quality for wireless network users. In the proposed user-centric framework, control plane and data plane are decoupled to manage the HetNets in a flexible and coadjutant way, and resource virtualization technology is introduced to abstract physical resources of HetNets into unified virtualized resources. Hence, ubiquitous and undifferentiated network connectivity and QoE (quality of experience driven fine-grained resource management could be achieved for wireless network users.

  6. Hierarchical Routing over Dynamic Wireless Networks

    CERN Document Server

    Tschopp, Dominique; Grossglauser, Matthias

    2009-01-01

    Wireless network topologies change over time and maintaining routes requires frequent updates. Updates are costly in terms of consuming throughput available for data transmission, which is precious in wireless networks. In this paper, we ask whether there exist low-overhead schemes that produce low-stretch routes. This is studied by using the underlying geometric properties of the connectivity graph in wireless networks.

  7. Theoretical Foundations of Wireless Networks

    Science.gov (United States)

    2015-07-22

    wireless networks. The interesting aspect of imperfect CSI in a networked setting is that different terminals are likely to have different perceptions ...Regarding asymptotic behaviors, observe that agents’ stage payoffs capture the kind of trade-off exemplified by the Keynesian beauty contest: each...imperfect CSI in a networked setting is that different terminals are likely to have different perceptions on the values of different channels. In

  8. Safe Cooperating Cyber-Physical Systems using Wireless Communication

    DEFF Research Database (Denmark)

    Pop, Paul; Scholle, Detlef; Sljivo, Irfan

    2017-01-01

    This paper presents an overview of the ECSEL project entitled ―Safe Cooperating Cyber-Physical Systems using Wireless Communication‖ (SafeCOP), which runs during the period 2016–2019. SafeCOP targets safety-related Cooperating Cyber-Physical Systems (CO-CPS) characterised by use of wireless...... detection of abnormal behaviour, triggering if needed a safe degraded mode. SafeCOP will also develop methods and tools, which will be used to produce safety assurance evidence needed to certify cooperative functions. SafeCOP will extend current wireless technologies to ensure safe and secure cooperation...

  9. Wireless wearable network and wireless body-centric network for future wearable computer

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    The wireless wearable network and wireless body-centric network can assistant to the user anywhere at anytime communicating with wireless components seamlessly. In this paper, the wireless wearable network and wireless body-centric network have been discussed, and the frequency band and human body effect has been estimated. The bluetooth and UWB technology can be used to construct the narrow band and the broad band wireless wearable network and wireless body-centric network separately. Further, the narrow band wireless wearable network and wireless body-centric network based on bluetooth technology has been constructed by integrated planar inverted-F antenna and the communication channel character has been studied by measurement. The results can provide the possibility of producing a prototype radio system that can be integrated with the wearable computers by suitable wireless technologies developed and applied to facilitate a reliable and continuous connectivity between the system units.

  10. Co-operative Wireless Intrusion Detection System Using MIBs From SNMP

    Directory of Open Access Journals (Sweden)

    Ashvini Vyavhare

    2012-03-01

    Full Text Available In emerging technology of Internet, security issues are becoming more challenging. In case of wired LAN it is somewhat in control, but in case of wireless networks due to exponential growth in attacks, it has made difficult to detect such security loopholes. Wireless network security is being addressed using firewalls, encryption techniques and wired IDS (Intrusion Detection System methods. But the approaches which were used in wired network were not successful in producing effective results for wireless networks. It is so because of features of wireless network such as open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense etc. So, there is need for new approach which will efficiently detect intrusion in wireless network. Efficiency can be achieved by implementing distributive, co-operative based, multi-agent IDS. The proposed system supports all these three features. It includes mobile agents for intrusion detection which uses SNMP (Simple network Management Protocol and MIB (Management Information Base variables for mobile wireless networks

  11. Cognitive Radio Networks for Tactical Wireless Communications

    Science.gov (United States)

    2014-12-01

    APs work as wireless routers and form a wireless backbone network. The MSs can either access the BSs/APs directly, or use other MSs as multi-hop...Cognitive radio networks for tactical wireless communications Helen Tang; Susan Watson DRDC – Ottawa Research Centre Defence Research and...Development Canada Scientific Report DRDC-RDDC-2014-R185 December 2014 Cognitive radio networks for tactical wireless communications Helen Tang

  12. Security procedures in wireless networks

    Institute of Scientific and Technical Information of China (English)

    郑光

    2009-01-01

    In the paper, we will introduce the mechanisms and the weaknesses of the Wired Equivalent Privacy (WEP) and 802.1 li security procedures in the wireless networks. After that, the Wi-Fi Protected Access (WPA), a standards-based security mechanism that can eliminate most of 802.11 security problems will be introduced.

  13. Multihop Wireless Networks Opportunistic Routing

    CERN Document Server

    Zeng, Kai; Li, Ming

    2011-01-01

    This book provides an introduction to opportunistic routing an emerging technology designed to improve the packet forwarding reliability, network capacity and energy efficiency of multihop wireless networks This book presents a comprehensive background to the technological challenges lying behind opportunistic routing. The authors cover many fundamental research issues for this new concept, including the basic principles, performance limit and performance improvement of opportunistic routing compared to traditional routing, energy efficiency and distributed opportunistic routing protocol desig

  14. Underwater optical wireless communication network

    Science.gov (United States)

    Arnon, Shlomi

    2010-01-01

    The growing need for underwater observation and subsea monitoring systems has stimulated considerable interest in advancing the enabling technologies of underwater wireless communication and underwater sensor networks. This communication technology is expected to play an important role in investigating climate change, in monitoring biological, biogeochemical, evolutionary, and ecological changes in the sea, ocean, and lake environments, and in helping to control and maintain oil production facilities and harbors using unmanned underwater vehicles (UUVs), submarines, ships, buoys, and divers. However, the present technology of underwater acoustic communication cannot provide the high data rate required to investigate and monitor these environments and facilities. Optical wireless communication has been proposed as the best alternative to meet this challenge. Models are presented for three kinds of optical wireless communication links: (a) a line-of-sight link, (b) a modulating retroreflector link, and (c) a reflective link, all of which can provide the required data rate. We analyze the link performance based on these models. From the analysis, it is clear that as the water absorption increases, the communication performance decreases dramatically for the three link types. However, by using the scattered light it was possible to mitigate this decrease in some cases. It is concluded from the analysis that a high-data-rate underwater optical wireless network is a feasible solution for emerging applications such as UUV-to-UUV links and networks of sensors, and extended ranges in these applications could be achieved by applying a multi-hop concept.

  15. A SIMO Fiber Aided Wireless Network Architecture

    OpenAIRE

    Ray, Siddharth; Medard, Muriel; Zheng, Lizhong

    2006-01-01

    The concept of a fiber aided wireless network architecture (FAWNA) is introduced in [Ray et al., Allerton Conference 2005], which allows high-speed mobile connectivity by leveraging the speed of optical networks. In this paper, we consider a single-input, multiple-output (SIMO) FAWNA, which consists of a SIMO wireless channel and an optical fiber channel, connected through wireless-optical interfaces. We propose a scheme where the received wireless signal at each interface is quantized and se...

  16. Dynamic wireless sensor networks

    CERN Document Server

    Oteafy, Sharief M A

    2014-01-01

    In this title, the authors leap into a novel paradigm of scalability and cost-effectiveness, on the basis of resource reuse. In a world with much abundance of wirelessly accessible devices, WSN deployments should capitalize on the resources already available in the region of deployment, and only augment it with the components required to meet new application requirements. However, if the required resources already exist in that region, WSN deployment converges to an assignment and scheduling scheme to accommodate for the new application given the existing resources. Such resources are polled

  17. Wireless Sensor Networks for Healthcare Applications

    CERN Document Server

    Dishongh, Terrance J; Kuris, Ben

    2009-01-01

    This unique reference focuses on methods of application, validation and testing based on real deployments of sensor networks in the clinical and home environments. Key topics include healthcare and wireless sensors, sensor network applications, designs of experiments using sensors, data collection and decision making, clinical deployment of wireless sensor networks, contextual awareness medication prompting field trials in homes, social health monitoring, and the future of wireless sensor networks in healthcare.

  18. Sybil attack in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Abirami.K

    2013-04-01

    Full Text Available Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for security.

  19. Security Threats in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Giannetsos, Athanasios

    2011-01-01

    intrusions forms an important part of an integrated approach to network security. In this work, we start by considering the problem of cooperative intrusion detection in WSNs and develop a lightweight ID system, called LIDeA, which follows an intelligent agent-based architecture. We show how such a system....... Security and privacy are rapidly replacing performance as the first and foremost concern in many sensor networking scenarios. While security prevention is important, it cannot guarantee that attacks will not be launched and that, once launched, they will not be successful. Therefore, detection of malicious...... networks are. Motivated by this unexplored security aspect, we investigate a new set of memory related vulnerabilities for sensor embedded devices that, if exploited, can lead to the execution of software-based attacks. We demonstrate how to execute malware on wireless sensor nodes that are based...

  20. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  1. On hybrid cooperation in underlay cognitive radio networks

    KAUST Repository

    Mahmood, Nurul Huda

    2012-11-01

    In wireless systems where transmitters are subject to a strict received power constraint, such as in underlay cognitive radio networks, cooperative communication is a promising strategy to enhance network performance, as it helps to improve the coverage area and outage performance of a network. However, this comes at the expense of increased resource utilization. To balance the performance gain against the possible over-utilization of resources, we propose a hybrid-cooperation technique for underlay cognitive radio networks, where secondary users cooperate only when required. Various performance measures of the proposed hybrid-cooperation technique are analyzed in this paper, and are also further validated numerically. © 2012 IEEE.

  2. A Distributed MAC Protocol for Cooperation in Random Access Networks

    CERN Document Server

    Böcherer, Georg

    2008-01-01

    WLAN is one of the most successful applications of wireless communications in daily life because of low cost and ease of deployment. The enabling technique for this success is the use of random access schemes for the wireless channel. Random access requires minimal coordination between the nodes, which considerably reduces the cost of the infrastructure. Recently, cooperative communication in wireless networks has been of increasing interest because it promises higher rates and reliability. An additional MAC overhead is necessary to coordinate the nodes to allow cooperation and this overhead can possibly cancel out the cooperative benefits. In this work, a completely distributed protocol is proposed that allows nodes in the network to cooperate via Two-Hop and Decode-and-Forward for transmitting their data to a common gateway node. It is shown that high throughput gains are obtained in terms of the individual throughput that can be guaranteed to any node in the network. These results are validated by Monte Ca...

  3. Wireless Sensor Networks Approach

    Science.gov (United States)

    Perotti, Jose M.

    2003-01-01

    This viewgraph presentation provides information on hardware and software configurations for a network architecture for sensors. The hardware configuration uses a central station and remote stations. The software configuration uses the 'lost station' software algorithm. The presentation profiles a couple current examples of this network architecture in use.

  4. Capacity Limit, Link Scheduling and Power Control in Wireless Networks

    Science.gov (United States)

    Zhou, Shan

    2013-01-01

    The rapid advancement of wireless technology has instigated the broad deployment of wireless networks. Different types of networks have been developed, including wireless sensor networks, mobile ad hoc networks, wireless local area networks, and cellular networks. These networks have different structures and applications, and require different…

  5. Weaponizing Wireless Networks

    DEFF Research Database (Denmark)

    Giannetsos, Athanasios; Tassos, Dimitriou; Prasad, Neeli R.

    2010-01-01

    The pervasive interconnection of autonomous sensor devices has given birth to a broad class of exciting new applications. At the same time, however, the unattended nature and the limited resources of sensor nodes have created an equal number of vulnerabilities that attackers can exploit in order...... to gain access in the network and the information transferred within. While much work has been done on trying to defend these networks, little has been done on suggesting sophisticated tools for proving how vulnerable sensor networks are. This work demonstrates a tool that allows both passive monitoring...... of transactional data in sensor networks, such as message rate, mote frequency, message routing, etc., but also discharge of various attacks against them. To the best of our knowledge, this is the first instance of an attack tool that can be used by an adversary to penetrate the confidentiality and functionality...

  6. Future wireless and optical networks

    CERN Document Server

    Jiang, Shengming

    2012-01-01

    This book reviews the challenges of all-optical and wireless networks for the future Internet, with a focus on cross-layer design and optimization. Features: presents a thorough introduction to major networking modes and their effect on Internet development; proposes a new structure favorable for all-optical packet switching; discusses a new quality of service (QoS) provisioning approach, which overcomes the scalability problem of IntServ and the coarse QoS granularity of DiffServ; describes the end-to-end arguments in Internet design, before investigating a solution to congestion control prob

  7. Maximum Multiflow in Wireless Network Coding

    CERN Document Server

    Zhou, Jin-Yi; Jiang, Yong; Zheng, Hai-Tao

    2012-01-01

    In a multihop wireless network, wireless interference is crucial to the maximum multiflow (MMF) problem, which studies the maximum throughput between multiple pairs of sources and sinks. In this paper, we observe that network coding could help to decrease the impacts of wireless interference, and propose a framework to study the MMF problem for multihop wireless networks with network coding. Firstly, a network model is set up to describe the new conflict relations modified by network coding. Then, we formulate a linear programming problem to compute the maximum throughput and show its superiority over one in networks without coding. Finally, the MMF problem in wireless network coding is shown to be NP-hard and a polynomial approximation algorithm is proposed.

  8. Interworking of wireless lans and cellular networks

    CERN Document Server

    Song, Wei

    2014-01-01

    The next-generation of wireless communications are envisioned to be supported by heterogeneous networks by using various wireless access technologies. The popular cellular networks and wireless local area networks (WLANs) present perfectly complementary characteristics in terms of service capacity, mobility support, and quality-of-service (QoS) provisioning. The cellular/WLAN interworking is an effective way to promote the evolution of wireless networks. Interworking of Wireless LANs and Cellular Networks focuses on three aspects, namely access selection, call admission control and load sharing to investigate heterogeneous interworking for cellular/WLAN integrated networks. It not only reveals important observations but also offers useful tools for performance evaluation. The unique traffic and network characteristics are exploited to enhance interworking effectiveness. Theoretical analysis and simulation validation demonstrate benefits of cellular/WLAN interworking in real networks. Last but not the least,...

  9. Security Threats in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sushma

    2011-05-01

    Full Text Available Wireless Sensor Network (WSN is an emergingtechnology that shows great promise for variousfuturistic applications both for mass public andmilitary. The sensing technology combined withprocessing power and wireless communication makesit lucrative for being exploited in abundance in future.Wireless sensor networks are characterized byseverely constrained computational and energy resources, and an ad hoc operational environment. Wireless sensor networks (WSN are currently receiving significant attention due to their unlimitedpotential. However, it is still very early in the lifetime of such systems and many research challenges exist. This paper studies the security aspects of these networks.

  10. Seamless Mobility in Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Faouzi Zarai

    2010-12-01

    Full Text Available In next generation of wireless networks, different technologies belonging to one or more operators should be integrated to form a heterogeneous environment based on an IP core network infrastructure. This ensures user mobility and service continuity by maintaining connections when switching between varioustechnologies and it introduces new resources and possibilities for applications. In this context, an automatic interface selection based on instantaneous and practical constraints and user preferences (Quality of Service (QoS parameters, available resources, security, power consumption, etc is therefore required. The different network selection and handover schemes proposed in the literature can be classified into three approaches according to who is responsible for making the handover decision: the terminal, the network or thanks to a cooperation between both of them. However, these approaches keep presenting some drawbacks; namely the problem of resources management and network load balancing whenever the selection is controlled by the mobile terminal (MT and the problem of scalability and unknown operator’s management policy whenever the selection is rather controlled by the network. In this article, first we propose a new architecture and new network selection scheme that explicitly take into account the current resource usage and the user preferences. Furthermore, our solution ensures the selection of the most suitable network for each flow while taking into consideration its expectations in terms of QoS. A feasibility study of our architecture is then triggered on a single MT by using typical scenarios and using various algorithms to evaluate their performances.

  11. The Evolution of IDS Solutions in Wireless Ad-Hoc Networks To Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Novarun Deb

    2011-12-01

    Full Text Available The domain of wireless networks is inherently vulnerable to attacks due to the unreliable wireless medium. Such networks can be secured from intrusions using either prevention or detection schemes. This paper focuses its study on intrusion detection rather than prevention of attacks. As attackers keep onimprovising too, an active prevention method alone cannot provide total security to the system. Here in lies the importance of intrusion detection systems (IDS that are solely designed to detect intrusions in real time. Wireless networks are broadly classified into Wireless Ad-hoc Networks (WAHNs, Mobile Adhoc Networks (MANETs, Wireless Sensor Networks (WSNs and the most recent Wireless Mesh Networks (WMNs. Several IDS solutions have been proposed for these networks. This paper is an extension to a survey of IDS solutions for MANETs and WMNs published earlier in the sense that the present survey offers a comparative insight of recent IDS solutions for all the sub domains of wireless networks.

  12. RELAY ALGORITHM BASED ON NETWORK CODING IN WIRELESS LOCAL NETWORK

    Institute of Scientific and Technical Information of China (English)

    Wang Qi; Wang Qingshan; Wang Dongxue

    2013-01-01

    The network coding is a new technology in the field of information in 21st century.It could enhance the network throughput and save the energy consumption,and is mainly based on the single transmission rate.However,with the development of wireless network and equipment,wireless local network MAC protocols have already supported the multi-rate transmission.This paper investigates the optimal relay selection problem based on network coding.Firstly,the problem is formulated as an optimization problem.Moreover,a relay algorithm based on network coding is proposed and the transmission time gain of our algorithm over the traditional relay algorithm is analyzed.Lastly,we compare total transmission time and the energy consumption of our proposed algorithm,Network Coding with Relay Assistance (NCRA),Transmission Request (TR),and the Direct Transmission (DT) without relay algorithm by adopting IEEE 802.11b.The simulation results demonstrate that our algorithm that improves the coding opportunity by the cooperation of the relay nodes leads to the transmission time decrease of up to 17% over the traditional relay algorithms.

  13. Programming Wireless Sensor Networks

    Science.gov (United States)

    Lopes, Luís; Martins, Francisco; Barros, João

    Sensor networks can be viewed as a collection of tiny, low-cost devices programmed to sense the physical world and that communicate over radio links [12]. The devices are commonly called motes or smart dust [676], in allusion to their computational and sensing capabilities, as well as their increasingly small size.

  14. On Hybrid Cooperation in Underlay Cognitive Radio Networks

    DEFF Research Database (Denmark)

    Mahmood, Nurul Huda; Yilmaz, Ferkan; Øien, Geir E.

    2013-01-01

    of opportunistic wireless systems such as cognitive radio networks. In order to balance the performance gains from cooperative communication against the possible over-utilization of resources, we propose and analyze an adaptive-cooperation technique for underlay cognitive radio networks, termed as hybrid......-cooperation. Under the proposed cooperation scheme, secondary users in a cognitive radio network cooperate adaptively to enhance the spectral efficiency and the error performance of the network. The bit error rate, the spectral efficiency and the outage performance of the network under the proposed hybrid...... cooperation scheme with amplify-and-forward relaying are analyzed in this paper, and compared against conventional cooperation technique. Findings of the analytical performance analyses are further validated numerically through selected computer-based Monte-Carlo simulations. The proposed scheme is found...

  15. Evaluation of Communication Overheads in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Shiv Prasad Kori1 , Dr. R. K . Baghel2

    2013-04-01

    Full Text Available Wireless sensor network are collection of small sensing self powered nodes organized into a cooperative network which have certain processing capabilities and the nodes communicate wirelessly. Sensing, processing and communication are three key elements whose combination in one node gives rise to a vast number of applications of wireless sensor networks in areas such as environmental monitoring, warfare, education, agriculture to name a few. In the present work, the comparative evaluation of communication overhead due to sink mobility with speed variations, the effect of update time variation, the effect of number of nodes used in the wirelesssensor networks is carried out. It has been observed that communication overheads increasesignificantly when sink mobility is high. The communication overheads can be reduced by increasing update time

  16. Wireless network topology for monitoring mobile agents

    Science.gov (United States)

    Fraser, Matthew J.; James, Daniel A.; Thiel, David V.

    2005-02-01

    A wireless network of multiple sensor nodes for monitoring large numbers of mobile agents is described and investigated. Wireless monitoring provides time critical information from a number of data sources allowing near real-time analysis of the collected data. The developed wireless network provides a moderate data rate, is able to support many wireless nodes and is a low power solution. Novel network structures have been developed to satisfy all of these requirements. This paper evaluates a number of currently available wireless communication protocols, concluding that a Bluetooth wireless network satisfies the above criteria. To support a large number of devices, topologies using inter-piconet and piconet sharing methods have been developed. These network structures are outlined in detail and have been developed with the current Bluetooth hardware limitations in mind. The proposed wireless networks have been developed to be implemented with current Bluetooth hardware. A summary of network performance is included for each developed network structure, and from these figures an appropriate network structure has been chosen that satisfies the requirements of a wireless sensor network for monitoring mobile agents.

  17. Broadcast Network Coverage with Multicell Cooperation

    Directory of Open Access Journals (Sweden)

    Hongxiang Li

    2010-01-01

    Full Text Available Multicell cooperation has been identified as one of the underlying principles for future wireless communication systems. This paper studies the benefits of multicell cooperation in broadcast TV network from an information theoretical perspective. We define outage capacity as the figure of merit and derive the broadcast coverage area to evaluate such system. Specifically, we calculate the broadcast coverage area with given common information rate and outage probabilities when multiple base stations collaboratively transmit the broadcast signals. For the general MIMO case where receivers have multiple antennas, we provide simulation results to illustrate the expanded coverage area. In all cases, our results show that the coverage of a TV broadcast network can be significantly improved by multicell cooperation.

  18. Integration of RFID and Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    Miodrag; Bolic; Amiya; Nayak; Ivan; Stojmenovi.

    2007-01-01

    Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two important wireless technologies that have wide variety of applications and provide limitless future potentials. However,RFID and sensor networks almost are under development in parallel way. Integration of RFID and wireless sensor networks attracts little attention from research community. This paper first presents a brief introduction on RFID,and then investigates recent research works,new products/patents and applications that integrate RFID with sensor networks. Four types of integration are discussed. They are integrating tags with sensors,integrating tags with wireless sensor nodes,integrating readers with wireless sensor nodes and wire-less devices,and mix of RFID and sensors. New challenges and future works are discussed in the end.

  19. On Hybrid Cooperation in Underlay Cognitive Radio Networks

    DEFF Research Database (Denmark)

    Mahmood, Nurul Huda; Yilmaz, Ferkan; Øien, Geir E.;

    2013-01-01

    of opportunistic wireless systems such as cognitive radio networks. In order to balance the performance gains from cooperative communication against the possible over-utilization of resources, we propose and analyze an adaptive-cooperation technique for underlay cognitive radio networks, termed as hybrid......-cooperation. Under the proposed cooperation scheme, secondary users in a cognitive radio network cooperate adaptively to enhance the spectral efficiency and the error performance of the network. The bit error rate, the spectral efficiency and the outage performance of the network under the proposed hybrid......Cooperative communication is a promising strategy to enhance the performance of a communication network as it helps to improve the coverage area and the outage performance. However, such enhancement comes at the expense of increased resource utilization, which is undesirable; more so in the case...

  20. 多Sink协同移动的最大化网络生存期优化算法%Multiple Sinks Cooperative Mobility Optimization Algorithm to Maximize the Lifetime in Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    孙彦景; 田红; 王迎

    2012-01-01

    According to the problem of energy hole which caused by unbalanced consumption in wireless sensor networks (WSN), the paper proposes the multiple Sinks cooperative mobility optimization algorithm to maximize the lifetime for wireless sensor networks. In this algorithm, the interest region is divided into a quantity of virtual cells. It cooperates with ACO(Ant Colony Optimization) in the mobility of multiple Sinks based on network conditions. The time of Sinks sojourning at optional sites is converted to LP( Linear Program) and extending the lifetime of network. Simulation results indicate that LP-ACO ( Linear Program-Ant Colony Optimization) is effective on balancing the energy consumption It not only makes the network lifetime significantly longer than static, deployment ( STATIC) and random movement( RDM)of Sinks,but also more scalable.%针对无线传感器网络中因能量消耗不平衡造成的“能量洞”问题,提出多Sink协同移动的最大化网络生存期优化算法.该算法将监测区域分割成有限个虚拟单元格,通过蚁群优化算法ACO(Ant Colony Optimization)协同多Sink节点移动;同时,将多Sink节点在备选位置的停留时间归结为LP(Linear Program),最大化网络寿命.仿真结果表明,LP-ACO(Linear Program-Ant Colony Optimization)较好地均衡了传感器网络节点间的负载,网络寿命优于多Sink节点静态部署(STATIC)和随机移动(RDM)时场景,且具有良好的可扩展性.

  1. Filtering and control of wireless networked systems

    CERN Document Server

    Zhang, Dan; Yu, Li

    2017-01-01

    This self-contained book, written by leading experts, offers a cutting-edge, in-depth overview of the filtering and control of wireless networked systems. It addresses the energy constraint and filter/controller gain variation problems, and presents both the centralized and the distributed solutions. The first two chapters provide an introduction to networked control systems and basic information on system analysis. Chapters (3–6) then discuss the centralized filtering of wireless networked systems, presenting different approaches to deal with energy efficiency and filter/controller gain variation problems. The next part (chapters 7–10) explores the distributed filtering of wireless networked systems, addressing the main problems of energy constraint and filter gain variation. The final part (chapters 11–14) focuses on the distributed control of wireless networked systems. wireless networked systems for communication and control applications, the bo...

  2. Voice Quality Estimation in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Petr Zach

    2015-01-01

    Full Text Available This article deals with the impact of Wireless (Wi-Fi networks on the perceived quality of voice services. The Quality of Service (QoS metrics must be monitored in the computer network during the voice data transmission to ensure proper voice service quality the end-user has paid for, especially in the wireless networks. In addition to the QoS, research area called Quality of Experience (QoE provides metrics and methods for quality evaluation from the end-user’s perspective. This article focuses on a QoE estimation of Voice over IP (VoIP calls in the wireless networks using network simulator. Results contribute to voice quality estimation based on characteristics of the wireless network and location of a wireless client.

  3. The Security of Wireless Local Area Network

    Institute of Scientific and Technical Information of China (English)

    林楠; 李翠霞

    2007-01-01

    The Wireless Local Area Network (WLAN) is a new and developing technology and the security problem is always important in all networks; therefore, the security problems will be discussed in this article. The article firstly introduces the history of development of IEEE 802.11 and provides an overview of the Wireless LAN. The architecture of WLAN will be referred in next. Finally, the further of the wireless LAN will be prospected by this article.

  4. ZigBee for wireless networking

    OpenAIRE

    Lönn, Johan; Olsson, Jonas

    2005-01-01

    The past several years have witnessed a rapid development in the wireless network area. So far wireless networking has been focused on high-speed and long range applications. However, there are many wireless monitoring and control applications for industrial and home environments which require longer battery life, lower data rates and less complexity than those from existing standards. What the market need is a globally defined standard that meets the requirement for reliability, security, lo...

  5. Self-Similar Traffic In Wireless Networks

    OpenAIRE

    Jerjomins, R.; Petersons, E.

    2005-01-01

    Many studies have shown that traffic in Ethernet and other wired networks is self-similar. This paper reveals that wireless network traffic is also self-similar and long-range dependant by analyzing big amount of data captured from the wireless router.

  6. The coverage problem in video-based wireless sensor networks: a survey.

    Science.gov (United States)

    Costa, Daniel G; Guedes, Luiz Affonso

    2010-01-01

    Wireless sensor networks typically consist of a great number of tiny low-cost electronic devices with limited sensing and computing capabilities which cooperatively communicate to collect some kind of information from an area of interest. When wireless nodes of such networks are equipped with a low-power camera, visual data can be retrieved, facilitating a new set of novel applications. The nature of video-based wireless sensor networks demands new algorithms and solutions, since traditional wireless sensor networks approaches are not feasible or even efficient for that specialized communication scenario. The coverage problem is a crucial issue of wireless sensor networks, requiring specific solutions when video-based sensors are employed. In this paper, it is surveyed the state of the art of this particular issue, regarding strategies, algorithms and general computational solutions. Open research areas are also discussed, envisaging promising investigation considering coverage in video-based wireless sensor networks.

  7. Wireless Network Penetration Testing and Security Auditing

    Directory of Open Access Journals (Sweden)

    Wang Shao-Long

    2016-01-01

    Full Text Available IEEE802.11 wireless wireless networks have security issues that are vulnerable to a variety of attacks. Due to using radio to transport data, attackers can bypass firewalls, sniff sensitive information, intercept packets and send malicious packets. Security auditing and penetration testing is expected to ensure wireless networks security. The contributions of this work are analyzed the vulnerability and types of attacks pertaining to IEEE 802.11 WLAN, performed well known attacks in a laboratory environment to conduct penetration tests to confirm whether our wireless network is hackable or not. WAIDPS is configured as auditing tool to view wireless attacks, such as WEP/WPA/WPA2 cracking, rouge access points, denial of service attack. WAIDPS is designed to detect wireless intrusion with additional features. Penetration testing and auditing will mitigate the risk and threatening to protect WALN.

  8. Wireless Sensor Networks TestBed: ASNTbed

    CSIR Research Space (South Africa)

    Dludla, AG

    2013-05-01

    Full Text Available Wireless sensor networks (WSNs) have been used in different types of applications and deployed within various environments. Simulation tools are essential for studying WSNs, especially for exploring large-scale networks. However, WSN testbeds...

  9. Low-Power Wireless Sensor Network Infrastructures

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg

    environments and communication primitives in wireless sensor network and traditional network development are closing. However, fundamental differences in wireless technology and energy constraints are still to be considered at the lower levels of the software stack. To fulfill energy requirements hardware......Advancements in wireless communication and electronics improving form factor and hardware capabilities has expanded the applicability of wireless sensor networks. Despite these advancements, devices are still limited in terms of energy which creates the need for duty-cycling and low-power protocols......, and network management which enables construction of low-power wireless sensor network applications. More specifically, these services are designed with the extreme low-power scenarios of the SensoByg project in mind and are implemented as follows. First, low-power communication is implemented with Auto...

  10. DAWN: Dynamic Ad-hoc Wireless Network

    Science.gov (United States)

    2016-06-19

    Wireless Networks, , ( ): . doi: Ning Li, Jennifer C. Hou. Localized Topology Control Algorithms for Heterogeneous Wireless Networks, IEEE ...Multi-User Diversity in Single-Radio OFDMA AdHoc Networks Based on Gibbs Sampling, IEEE Milcom . 03-NOV-10, . : , TOTAL: 1 Number of Peer-Reviewed...Networks, ( ) Hui Xu, , Xianren Wu, , Hamid R. Sadjadpour, , J.J. Garcia-Luna-Aceves, . A Unified Analysis of Routing Protocols inMANETs, IEEE

  11. Analyzing the Low Power Wireless Links for Wireless Sensor Networks

    CERN Document Server

    Mamun, Md Mainul Islam; Kumar, Sumon; Islam, Md Zahidul

    2010-01-01

    There is now an increased understanding of the need for realistic link layer models in the wireless sensor networks. In this paper, we have used mathematical techniques from communication theory to model and analyze low power wireless links. Our work provides theoretical models for the link layer showing how Packet Reception Rate vary with Signal to Noise Ratio and distance for different modulation schemes and a comparison between MICA2 and TinyNode in terms of PRR.

  12. 无线网络终端协作多播技术研究%Cooperative Multicast Scheme Research in Wireless Networks

    Institute of Scientific and Technical Information of China (English)

    谢飞

    2014-01-01

    终端协作多播技术,因其能有效改善广播多播吞吐量的瓶颈问题而成为新的研究方向。针对当前多媒体广播多播业务的流行,对传统广播多播的缺点做了简要分析,介绍了协作通信与协作多播的基本原理,重点分析了当前国内外协作多播技术的研究现状,从中继节点的协作方式、协作策略与协作中继选择、多阶段协作多播三方面展开阐述,概括出当前的研究主要集中于提高吞吐量与降低系统功耗两方面。最后,对协作多播提出了展望,说明了协作多播走向商用还需解决的问题。%Multicast communication is an efficient mechanism for one-to-many transmissions over a broadcast wireless channel,but the group member with the worst channel condition becomes the bottleneck and results in conservative resource utilization. Cooperative multicast has gotten much attention because it can achieve high throughput than existing multicast scheme.A detailed introduction of the research status of cooperative multicast is given in this article,from which we find that most researches focus on the relay selection and the energy efficient cooperative multicast scheme.

  13. Self Reconfigurable Wireless Networks With Dsdv Protocol Implementation

    Directory of Open Access Journals (Sweden)

    K. Muthulakshmi

    2014-03-01

    Full Text Available In multi hop wireless networks experience frequent link failures caused by channel interference, dynamic obstacles, and/or applications’ bandwidth demands. These failures cause severe performance degradation in wireless networks or require expensive manual network management for their real-time recovery. This paper presents an autonomous network reconfiguration system (ARS with destination sequence distance vector (DSDV protocol that enables a multi radio Wireless network to autonomously recover from local link failures to preserve network performance. By using channel and radio diversities in Wireless networks, ARS generates necessary changes in local radio and channel assignments in order to recover from failures. Next, based on the thus-generated configuration changes, the system cooperatively reconfigures network settings among local mesh router. In this concept during the data transmission if the link fails in between the nodes, the previous node act as the header node. The header node, creating the loop around the neighboring nodes and find the energy efficient path, after finding the path send the data’s towards it to reach the destination. Because of this there is no chance for data losing, Here ARS has been implemented and evaluated extensively on through ns2-based simulation. Our evaluation results show that ARS outperforms existing failure recovery schemes in improving channel-efficiency .

  14. Cooperation in Networks and Scheduling

    NARCIS (Netherlands)

    van Velzen, S.

    2005-01-01

    This thesis deals with various models of cooperation in networks and scheduling. The main focus is how the benefits of this cooperation should be divided among the participating individuals. A major part of this analysis is concerned with stability of the cooperation. In addition, allocation rules a

  15. Contemporary Developments in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sangeeta Mittal

    2012-04-01

    Full Text Available Wireless Sensor Networks (WSN since their inception, a decade ago, have grown well in research and implementation. In this work the developments in WSNs are reported in three sub areas of wireless sensor networks that is, wireless sensor node (hardware and software, Communication & Networking issues in WSNs and application areas. WSNs are characterized by huge data hence research work in aggregation & mining is also discussed. Contemporary issues of integration of WSNs with other prevalent networks, sensor enabled smartness and role of artificial intelligence methods is elaborated. Insight into future directions & research avenues in all the above areas is provided

  16. Low-Power Wireless Sensor Network Infrastructures

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg

    , and network management which enables construction of low-power wireless sensor network applications. More specifically, these services are designed with the extreme low-power scenarios of the SensoByg project in mind and are implemented as follows. First, low-power communication is implemented with Auto......Advancements in wireless communication and electronics improving form factor and hardware capabilities has expanded the applicability of wireless sensor networks. Despite these advancements, devices are still limited in terms of energy which creates the need for duty-cycling and low-power protocols...... in order to achieve the wanted lifetimes. Through more than a decade of wireless sensor network research, progress towards realizing wanted lifetimes have been made and wireless standards for packet formatting and routing have been proposed. With standards in place, the wide-span between programming...

  17. The art of wireless sensor networks

    CERN Document Server

    2014-01-01

    During the last one and a half decades, wireless sensor networks have witnessed significant growth and tremendous development in both academia and industry.   “The Art of Wireless Sensor Networks: Volume 1: Fundamentals” focuses on the fundamentals concepts in the design, analysis, and implementation of wireless sensor networks. It covers the various layers of the lifecycle of this type of network from the physical layer up to the application layer. Its rationale is that the first volume covers contemporary design issues, tools, and protocols for radio-based two-dimensional terrestrial sensor networks. All the book chapters in this volume include up-to-date research work spanning various classic facets of the physical properties and functional behavior of wireless sensor networks, including physical layer, medium access control, data routing, topology management, mobility management, localization, task management, data management, data gathering, security, middleware, sensor technology, standards, and ...

  18. Resilient networking in wireless sensor networks

    CERN Document Server

    Erdene-Ochir, Ochirkhand; Valois, Fabrice; Kountouris, Apostolos

    2010-01-01

    This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In this report, we focus on the behavior of routing protocols to determine which properties make them more resilient to attacks. Our aim is to find some answers to the following questions. Are there any existing protocols, not designed initially for security, but which already contain some inherently resilient properties against attacks under which some portion of the network nodes is compromised? If yes, which specific behaviors are making these protocols more resilient? We propose in this report an overview of security strategies for WSNs in general, including existing attacks and defensive measures. In this report we focu...

  19. Location based Network Optimizations for Mobile Wireless Networks

    DEFF Research Database (Denmark)

    Nielsen, Jimmy Jessen

    selection in Wi-Fi networks and predictive handover optimization in heterogeneous wireless networks. The investigations in this work have indicated that location based network optimizations are beneficial compared to typical link measurement based approaches. Especially the knowledge of geographical...

  20. Wireless communications networks for the smart grid

    CERN Document Server

    Ho, Quang-Dung; Rajalingham, Gowdemy; Le-Ngoc, Tho

    2014-01-01

    This brief presents a comprehensive review of the network architecture and communication technologies of the smart grid communication network (SGCN). It then studies the strengths, weaknesses and applications of two promising wireless mesh routing protocols that could be used to implement the SGCN. Packet transmission reliability, latency and robustness of these two protocols are evaluated and compared by simulations in various practical SGCN scenarios. Finally, technical challenges and open research opportunities of the SGCN are addressed. Wireless Communications Networks for Smart Grid provi

  1. BackTrack testing wireless network security

    CERN Document Server

    Cardwell, Kevin

    2013-01-01

    Written in an easy-to-follow step-by-step format, you will be able to get started in next to no time with minimal effort and zero fuss.BackTrack: Testing Wireless Network Security is for anyone who has an interest in security and who wants to know more about wireless networks.All you need is some experience with networks and computers and you will be ready to go.

  2. Opportunistic Beacon Networks: Information Dissemination via Wireless Network Identifiers

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2016-01-01

    This paper presents OBN, a universal opportunistic ad hoc networking model particularly intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the utilization of universally-available wireless network identifiers. As a ubiquitous

  3. Opportunistic Beacon Networks: Information Dissemination via Wireless Network Identifiers

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Hans; Havinga, Paul J.M.

    2016-01-01

    This paper presents OBN, a universal opportunistic ad hoc networking model particularly intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the utilization of universally-available wireless network identifiers. As a ubiquitous

  4. Utility-based bandwidth allocation algorithm for heterogeneous wireless networks

    Institute of Scientific and Technical Information of China (English)

    CHAI Rong; WANG XiuJuan; CHEN QianBin; SVENSSON Tommy

    2013-01-01

    In next generation wireless network (NGWN), mobile users are capable of connecting to the core network through various heterogeneous wireless access networks, such as cellular network, wireless metropolitan area network (WMAN), wireless local area network (WLAN), and ad hoc network. NGWN is expected to provide high-bandwidth connectivity with guaranteed quality-of-service to mobile users in a seamless manner; however, this desired function demands seamless coordination of the heterogeneous radio access network (RAN) technologies. In recent years, some researches have been conducted to design radio resource management (RRM) architectures and algorithms for NGWN; however, few studies stress the problem of joint network performance optimization, which is an essential goal for a cooperative service providing scenario. Furthermore, while some authors consider the competition among the service providers, the QoS requirements of users and the resource competition within access networks are not fully considered. In this paper, we present an interworking integrated network architecture, which is responsible for monitoring the status information of different radio access technologies (RATs) and executing the resource allocation algorithm. Within this architecture, the problem of joint bandwidth allocation for heterogeneous integrated networks is formulated based on utility function theory and bankruptcy game theory. The proposed bandwidth allocation scheme comprises two successive stages, i.e., service bandwidth allocation and user bandwidth allocation. At the service bandwidth allocation stage, the optimal amount of bandwidth for different types of services in each network is allocated based on the criterion of joint utility maximization. At the user bandwidth allocation stage, the service bandwidth in each network is optimally allocated among users in the network according to bankruptcy game theory. Numerical results demonstrate the efficiency of

  5. Development of Time Synchronized Wireless Sensor Network

    Science.gov (United States)

    Uchimura, Yutaka; Takahashi, Motoichi; Nasu, Tadashi

    Network based wireless sensing has become an important area of research and various new applications for remote sensing are expected to emerge. One of the promising applications is structural health monitoring of building or civil engineering structure and it often requires vibration measurement. For the vibration measurement via wireless network, time synchronization is indispensable. In this paper, we introduce a newly developed time synchronized wireless sensor network system. The system employs IEEE 802.11 standard based TSF counter and sends the measured data with the counter value. It enables consistency on common clock among different wireless nodes. We describe the accuracy evaluation by simulation studies when the size of nodes increased. The hardware and software specifications of the developed wireless sensing system are shown. The experiments were conducted in a three-street reinforced concrete building and results showed the system performs more than sufficiently.

  6. Voice over IP in Wireless Heterogeneous Networks

    DEFF Research Database (Denmark)

    Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee

    The convergence of different types of traffic has preceded the convergence of systems and services in a wireless heterogeneous network. Voice and data traffic are usually treated separate in both 2G and 2.5G wireless networks. With advances in packet switching technology and especially......IP communications are difficult to achieve in a time-varying environment due to channel errors and traffic congestion and across different systems. The provision of VoIP in wireless heterogeneous networks requires a set of time-efficient control mechanisms to support a VoIP session with acceptable quality...

  7. Wireless Sensor Networks: Opportunities and Challenges

    Directory of Open Access Journals (Sweden)

    Matthew N. O. Sadiku

    2014-01-01

    Full Text Available The popularity of cell phones, laptops, PDAs and intelligent electronics has made computing devices to become cheaper and more pervasive in daily life. The desire for connectivity among these devices has caused an exponential growth in wireless communication. Wireless sensor networks (WSNs provide an example of this phenomenon. WSNs belong to the general family of sensor networks that employ distributed sensors to collect information on entities of interest. This paper provides a brief introduction to wireless sensor networks. It addresses the opportunities and challenges of WSNs

  8. Application for Measurement in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Miroslav MAHDAL

    2009-06-01

    Full Text Available This paper deals with wireless sensor networks, which are based on IEEE 802.15.4 standard. The development kit from Jennic company was used for wireless measuring of values and for creation of sensor network. For this purposes the sensor boards with wireless modules with marking JN5139 were used. These boards provide sensors (sensor of temperature, relative humidity and light sensor but also another interface, which helps to develop applications. Modules are programmed in Integrated Development Environment (IDE, which integrates C function library and C++ compiler and linker. The visualization application was created for monitoring of wireless sensor network. There is the possibility of local and wireless measurement. For creation of this application the SCADA/HMI system, Control Web 5 was used. This SCADA/HMI system enables to communicate with all wireless modules through base station (network's coordinator. The application also enables initialisation and network setting the any wireless module communicating with the base station. The advantage is the remote configuration and control of network. The application also enables the gathering, converting, viewing and archiving of incoming data from particular modules.

  9. Wireless Laptops and Local Area Networks.

    Science.gov (United States)

    Tolson, Stephanie Diane

    2001-01-01

    Describes experiences at St. Louis Community College at Florissant Valley (Missouri) with the use of wireless technology and a local area network for library bibliographic instruction. Discusses faculty input and attitudes; technical challenges; and experiences at other community colleges that have found wireless connections more economical than…

  10. On computer vision in wireless sensor networks.

    Energy Technology Data Exchange (ETDEWEB)

    Berry, Nina M.; Ko, Teresa H.

    2004-09-01

    Wireless sensor networks allow detailed sensing of otherwise unknown and inaccessible environments. While it would be beneficial to include cameras in a wireless sensor network because images are so rich in information, the power cost of transmitting an image across the wireless network can dramatically shorten the lifespan of the sensor nodes. This paper describe a new paradigm for the incorporation of imaging into wireless networks. Rather than focusing on transmitting images across the network, we show how an image can be processed locally for key features using simple detectors. Contrasted with traditional event detection systems that trigger an image capture, this enables a new class of sensors which uses a low power imaging sensor to detect a variety of visual cues. Sharing these features among relevant nodes cues specific actions to better provide information about the environment. We report on various existing techniques developed for traditional computer vision research which can aid in this work.

  11. Distributed Algorithms in Wireless Sensor Networks

    NARCIS (Netherlands)

    Nieberg, Tim; Broersma, Hajo; Faigle, Ulrich; Hurink, Johann; Pickl, Stefan; Woeginger, Gerhard

    2003-01-01

    Wireless sensor networks (WSNs) are an emerging field of research which combines many challenges in distributed computing and network optimization. One important goal is to improve the functional lifetime of the sensor network using energy-efficient distributed algorithms, networking and routing tec

  12. Transmission capacity of wireless networks

    CERN Document Server

    Weber, Steven

    2012-01-01

    Transmission capacity (TC) is a performance metric for wireless networks that measures the spatial intensity of successful transmissions per unit area, subject to a constraint on the permissible outage probability (where outage occurs when the SINR at a receiver is below a threshold). This volume gives a unified treatment of the TC framework that has been developed by the authors and their collaborators over the past decade. The mathematical framework underlying the analysis (reviewed in Ch. 2) is stochastic geometry: Poisson point processes model the locations of interferers, and (stable) shot noise processes represent the aggregate interference seen at a receiver. Ch. 3 presents TC results (exact, asymptotic, and bounds) on a simple model in order to illustrate a key strength of the framework: analytical tractability yields explicit performance dependence upon key model parameters. Ch. 4 presents enhancements to this basic model --- channel fading, variable link distances, and multi-hop. Ch. 5 presents four...

  13. Routing for wireless multi-hop networks

    CERN Document Server

    Hamid, Sherin Abdel; Takahara, Glen

    2013-01-01

    The focus of this brief is to identify what unifies and what distinguishes the routing functions in four wireless multi-hop network paradigms. The brief introduces a generic routing model that can be used as a foundation of wireless multi-hop routing protocol analysis and design. It demonstrates that such model can be adopted by any wireless multi-hop routing protocol. Also presented is a glimpse of the ideal wireless multi-hop routing protocol along with several open issues.

  14. Mobility and Handoff Management in Wireless Networks

    CERN Document Server

    Sen, Jaydip

    2010-01-01

    With the increasing demands for new data and real-time services, wireless networks should support calls with different traffic characteristics and different Quality of Service (QoS)guarantees. In addition, various wireless technologies and networks exist currently that can satisfy different needs and requirements of mobile users. Since these different wireless networks act as complementary to each other in terms of their capabilities and suitability for different applications, integration of these networks will enable the mobile users to be always connected to the best available access network depending on their requirements. This integration of heterogeneous networks will, however, lead to heterogeneities in access technologies and network protocols. To meet the requirements of mobile users under this heterogeneous environment, a common infrastructure to interconnect multiple access networks will be needed. In this chapter, the design issues of a number of mobility management schemes have been presented. Eac...

  15. Energy-efficient cooperative routing in BER constrained multihop networks

    Institute of Scientific and Technical Information of China (English)

    Behrouz MAHAM; Mérouane DEBBAH; Are HJ(φ)RUNGNES

    2009-01-01

    Due to the limited energy supplies of nodes, in many applications like wireless sensor networks energy-efficiency is crucial for extending the lifetime of these net-works. We study the routing problem for multihop wireless ad hoc networks based on cooperative transmission. The source node wants to transmit messages to a single destina-tion. Other nodes in the network may operate as relay nodes.In this paper, we propose a cooperative multihop routing for the purpose of power savings, constrained on a required bit error rate (BER) at the destination. We derive analytical re-sults for line and grid network topologies. It is shown that energy savings of 100% are achievable in line and grid net-works with a large number of nodes for BER = 10-4 con-straint at the destination.

  16. A wireless robot for networked laparoscopy.

    Science.gov (United States)

    Castro, Cristian A; Alqassis, Adham; Smith, Sara; Ketterl, Thomas; Sun, Yu; Ross, Sharona; Rosemurgy, Alexander; Savage, Peter P; Gitlin, Richard D

    2013-04-01

    State-of-the-art laparoscopes for minimally invasive abdominal surgery are encumbered by cabling for power, video, and light sources. Although these laparoscopes provide good image quality, they interfere with surgical instruments, occupy a trocar port, require an assistant in the operating room to control the scope, have a very limited field of view, and are expensive. MARVEL is a wireless Miniature Anchored Robotic Videoscope for Expedited Laparoscopy that addresses these limitations by providing an inexpensive in vivo wireless camera module (CM) that eliminates the surgical-tool bottleneck experienced by surgeons in current laparoscopic endoscopic single-site (LESS) procedures. The MARVEL system includes 1) multiple CMs that feature a wirelessly controlled pan/tilt camera platform, which enable a full hemisphere field of view inside the abdominal cavity, wirelessly adjustable focus, and a multiwavelength illumination control system; 2) a master control module that provides a near-zero latency video wireless communications link, independent wireless control for multiple MARVEL CMs, digital zoom; and 3) a wireless human-machine interface that gives the surgeon full control over CM functionality. The research reported in this paper is the first step in developing a suite of semiautonomous wirelessly controlled and networked robotic cyber-physical devices to enable a paradigm shift in minimally invasive surgery and other domains such as wireless body area networks.

  17. Relay vs. User Cooperation in Time-Duplexed Multiaccess Networks

    CERN Document Server

    Sankar, Lalitha; Mandayam, Narayan B

    2008-01-01

    The performance of user-cooperation in a multi-access network is compared to that of using a wireless relay. Using the total transmit and processing power consumed at all nodes as a cost metric, the outage probabilities achieved by dynamic decode-and-forward (DDF) and amplify-and-forward (AF) are compared for the two networks. A geometry-inclusive high signal-to-noise ratio (SNR) outage analysis in conjunction with area-averaged numerical simulations shows that user and relay cooperation achieve a maximum diversity of K and 2 respectively for a K-user multiaccess network under both DDF and AF. However, when accounting for energy costs of processing and communication, relay cooperation can be more energy efficient than user cooperation, i.e., relay cooperation achieves coding (SNR) gains, particularly in the low SNR regime, that override the diversity advantage of user cooperation.

  18. Advances in wireless sensors and sensor networks

    CERN Document Server

    Mukhopadhyay, Subhas Chandra; Leung, Henry

    2010-01-01

    Written by experts, this book illustrates and collects recent advances in wireless sensors and sensor networks. It provides clever support for scientists, students and researchers in order to stimulate exchange and discussions for further developments.

  19. Topology Optimisation of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Thike Aye Min

    2016-01-01

    Full Text Available Wireless sensor networks are widely used in a variety of fields including industrial environments. In case of a clustered network the location of cluster head affects the reliability of the network operation. Finding of the optimum location of the cluster head, therefore, is critical for the design of a network. This paper discusses the optimisation approach, based on the brute force algorithm, in the context of topology optimisation of a cluster structure centralised wireless sensor network. Two examples are given to verify the approach that demonstrate the implementation of the brute force algorithm to find an optimum location of the cluster head.

  20. Optimal Grouping and Matching for Network-Coded Cooperative Communications

    Energy Technology Data Exchange (ETDEWEB)

    Sharma, S; Shi, Y; Hou, Y T; Kompella, S; Midkiff, S F

    2011-11-01

    Network-coded cooperative communications (NC-CC) is a new advance in wireless networking that exploits network coding (NC) to improve the performance of cooperative communications (CC). However, there remains very limited understanding of this new hybrid technology, particularly at the link layer and above. This paper fills in this gap by studying a network optimization problem that requires joint optimization of session grouping, relay node grouping, and matching of session/relay groups. After showing that this problem is NP-hard, we present a polynomial time heuristic algorithm to this problem. Using simulation results, we show that our algorithm is highly competitive and can produce near-optimal results.

  1. Noncommutative Lightweight Signcryption for Wireless Sensor Networks

    OpenAIRE

    Lize Gu; Yun Pan; Mianxiong Dong; Kaoru Ota

    2013-01-01

    Key management techniques for secure wireless-sensor-networks-based applications must minimally incorporate confidentiality, authenticity, integrity, scalability, and flexibility. Signcryption is the proper primitive to do this. However, existing signcryption schemes are heavyweight and not suitable for resource-limited sensors. In this paper, we at first propose a braid-based signcryption scheme and then develop a key establishment protocol for wireless sensor networks. From the complexity v...

  2. Index Modulation Techniques for 5G Wireless Networks

    OpenAIRE

    Basar, Ertugrul

    2016-01-01

    The increasing demand for higher data rates, better quality of service, fully mobile and connected wireless networks lead the researchers to seek new solutions beyond 4G wireless systems. It is anticipated that 5G wireless networks, which are expected to be introduced around 2020, will achieve ten times higher spectral and energy efficiency than current 4G wireless networks and will support data rates up to 10 Gbps for low mobility users. The ambitious goals set for 5G wireless networks requi...

  3. Intrusion detection and monitoring for wireless networks.

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.; Stephano, Amanda (Indiana University); Tabriz, Parisa (University of Illinois at Urbana-Champaign); Pelon, Kristen (Cedarville University); McCoy, Damon (University of Colorado, Boulder); Lodato, Mark (Lafayette College); Hemingway, Franklin (University of New Mexico); Custer, Ryan P.; Averin, Dimitry (Polytechnic University); Franklin, Jason (Carnegie Mellon University); Kilman, Dominique Marie

    2005-11-01

    Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more

  4. Load Balancing in Wireless Mesh Network: a Survey

    Directory of Open Access Journals (Sweden)

    Maryam Asgari

    Full Text Available Wireless Mesh network (WMN is a state of the art networking standard for next generation of wireless network. The construction of these networks is basis of a network of wireless routers witch forwarding each other`s packets in a multi-hop manner. All us ...

  5. Cooperative Location Scheme for 2D Wireless Sensor Networks%无线传感器网络二维协作式定位方法

    Institute of Scientific and Technical Information of China (English)

    杜巧玲; 钱志鸿; 王树勋

    2009-01-01

    针对精度传统定位方式下的节点定位精度低的问题,讨论和研究了WSN(Wireless Sensor Network)网络中的节点定位精度问题.在基于RSSI(Received Signal Strength Indicator)无线传感器网络定位技术的基础上,通过分析二维位置参数估计的CRB(Cramer-Rao Bound)值,比较了传统定位方式下和协作方式下的位置估计,提出了设定阈值的协作式定位方法.该方法使部分节点在传统方式下定位,而部分节点在协作方式下定位.Matlab仿真实验证明,该定位方法能提高网络节点的定位精度.

  6. Simulations of Large-scale WiFi-based Wireless Networks: Interdisciplinary Challenges and Applications

    CERN Document Server

    Nekovee, Maziar

    2008-01-01

    Wireless Fidelity (WiFi) is the fastest growing wireless technology to date. In addition to providing wire-free connectivity to the Internet WiFi technology also enables mobile devices to connect directly to each other and form highly dynamic wireless adhoc networks. Such distributed networks can be used to perform cooperative communication tasks such ad data routing and information dissemination in the absence of a fixed infrastructure. Furthermore, adhoc grids composed of wirelessly networked portable devices are emerging as a new paradigm in grid computing. In this paper we review computational and algorithmic challenges of high-fidelity simulations of such WiFi-based wireless communication and computing networks, including scalable topology maintenance, mobility modelling, parallelisation and synchronisation. We explore similarities and differences between the simulations of these networks and simulations of interacting many-particle systems, such as molecular dynamics (MD) simulations. We show how the ce...

  7. Matching theory for wireless networks

    CERN Document Server

    Han, Zhu; Saad, Walid

    2017-01-01

    This book provides the fundamental knowledge of the classical matching theory problems. It builds up the bridge between the matching theory and the 5G wireless communication resource allocation problems. The potentials and challenges of implementing the semi-distributive matching theory framework into the wireless resource allocations are analyzed both theoretically and through implementation examples. Academics, researchers, engineers, and so on, who are interested in efficient distributive wireless resource allocation solutions, will find this book to be an exceptional resource. .

  8. Scalable Capacity Bounding Models for Wireless Networks

    OpenAIRE

    Du, Jinfeng; Medard, Muriel; Xiao, Ming; Skoglund, Mikael

    2014-01-01

    The framework of network equivalence theory developed by Koetter et al. introduces a notion of channel emulation to construct noiseless networks as upper (resp. lower) bounding models, which can be used to calculate the outer (resp. inner) bounds for the capacity region of the original noisy network. Based on the network equivalence framework, this paper presents scalable upper and lower bounding models for wireless networks with potentially many nodes. A channel decoupling method is proposed...

  9. Genetic Algorithm for Hierarchical Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sajid Hussain

    2007-09-01

    Full Text Available Large scale wireless sensor networks (WSNs can be used for various pervasive and ubiquitous applications such as security, health-care, industry automation, agriculture, environment and habitat monitoring. As hierarchical clusters can reduce the energy consumption requirements for WSNs, we investigate intelligent techniques for cluster formation and management. A genetic algorithm (GA is used to create energy efficient clusters for data dissemination in wireless sensor networks. The simulation results show that the proposed intelligent hierarchical clustering technique can extend the network lifetime for different network deployment environments.

  10. COalitions in COOperation Networks (COCOON): Social Network Analysis and Game Theory to Enhance Cooperation Networks

    NARCIS (Netherlands)

    Sie, Rory

    2012-01-01

    Sie, R. L. L. (2012). COalitions in COOperation Networks (COCOON): Social Network Analysis and Game Theory to Enhance Cooperation Networks (Unpublished doctoral dissertation). September, 28, 2012, Open Universiteit in the Netherlands (CELSTEC), Heerlen, The Netherlands.

  11. COalitions in COOperation Networks (COCOON): Social Network Analysis and Game Theory to Enhance Cooperation Networks

    NARCIS (Netherlands)

    Sie, Rory

    2012-01-01

    Sie, R. L. L. (2012). COalitions in COOperation Networks (COCOON): Social Network Analysis and Game Theory to Enhance Cooperation Networks (Unpublished doctoral dissertation). September, 28, 2012, Open Universiteit in the Netherlands (CELSTEC), Heerlen, The Netherlands.

  12. Towards Controlling Latency in Wireless Networks

    KAUST Repository

    Bouacida, Nader

    2017-04-24

    Wireless networks are undergoing an unprecedented revolution in the last decade. With the explosion of delay-sensitive applications in the Internet (i.e., online gaming and VoIP), latency becomes a major issue for the development of wireless technology. Taking advantage of the significant decline in memory prices, industrialists equip the network devices with larger buffering capacities to improve the network throughput by limiting packets drops. Over-buffering results in increasing the time that packets spend in the queues and, thus, introducing more latency in networks. This phenomenon is known as “bufferbloat”. While throughput is the dominant performance metric, latency also has a huge impact on user experience not only for real-time applications but also for common applications like web browsing, which is sensitive to latencies in order of hundreds of milliseconds. Concerns have arisen about designing sophisticated queue management schemes to mitigate the effects of such phenomenon. My thesis research aims to solve bufferbloat problem in both traditional half-duplex and cutting-edge full-duplex wireless systems by reducing delay while maximizing wireless links utilization and fairness. Our work shed lights on buffer management algorithms behavior in wireless networks and their ability to reduce latency resulting from excessive queuing delays inside oversized static network buffers without a significant loss in other network metrics. First of all, we address the problem of buffer management in wireless full-duplex networks by using Wireless Queue Management (WQM), which is an active queue management technique for wireless networks. Our solution is based on Relay Full-Duplex MAC (RFD-MAC), an asynchronous media access control protocol designed for relay full-duplexing. Compared to the default case, our solution reduces the end-to-end delay by two orders of magnitude while achieving similar throughput in most of the cases. In the second part of this thesis

  13. The Development & Implementation of Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Dr Madhumita Dash

    2014-03-01

    Full Text Available Abstract : The increasing use of wireless networks and the constant miniaturization of electrical devices has empowered the development of Wireless Body Area Net-works . Wireless Body Area Network is a system of devices in close proximity to a person’s body that cooperate for the benefit of the user where various sensors are attached on clothing or on the body or even implanted under the skin. This paper shows several uses of the BAN technology and the most obvious application of a BAN is in the medical sector, however there are also more recreational uses to BANs. Using a WBAN, the patient experiences a greater physical mobility and is no longer compelled to stay in the hospital. This paper offers a survey of the concept of Wireless Body Area Networks. As WBANs are placed on the human body and often transport private data, security is also considered. This paper will discuss the technologies surrounding BANs, as well as several common applications for BANs.

  14. A Generalized Framework for Energy Conservation in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    V. S. Anita Sofia

    2011-01-01

    Full Text Available A Wireless Sensor Networks (WSN consists of spatially distributed autonomous sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants. WSN contains a large number of nodes with a limited energy supply. A wireless sensor network consists of nodes that can communicate with each other via wireless links. Sensors are be remotely deployed in large numbers and operates autonomously in unattended environments. One way to support efficient communication between sensors is to organize the network into several groups, called clusters, with each cluster electing one node as the head of cluster To support scalability, nodes are often grouped into disjoint and mostly non-overlapping clusters. This paper deals about the frame work for energy conservation of a Wireless sensor network. The frame work is developed such a way that the nodes are to be clustered, electing the cluster head, performing intra cluster transmission and from the cluster head the information is transmitted to the base station.

  15. Network Coded Cooperation Over Time-Varying Channels

    DEFF Research Database (Denmark)

    Khamfroush, Hana; Lucani Rötter, Daniel Enrique; Barros, joao

    2014-01-01

    In this paper, we investigate the optimal design of cooperative network-coded strategies for a three-node wireless network with time-varying, half-duplex erasure channels. To this end, we formulate the problem of minimizing the total cost of transmitting M packets from source to two receivers...... that are suitable for practical systems. We use two wireless channel models to analyse the performance of the proposed heuristics in practical wireless networks, namely, (a) an infrastructure-to-vehicle (I2V) communication in a highway scenario considering Rayleigh fading, and (b) real packet loss measurements...... for WiFi using Aalborg University’s Raspberry Pi testbed. We compare our results with random linear network coding (RLNC) broadcasting schemes showing that our heuristics can provide up to 2x gains in completion time and up to 4x gains in terms of reliably serviced data packets....

  16. Topological properties of random wireless networks

    Indian Academy of Sciences (India)

    Srikanth K Iyer; D Manjunath

    2006-04-01

    Wireless networks in which the node locations are random are best modelled as random geometric graphs (RGGs). In addition to their extensive application in the modelling of wireless networks, RGGs find many new applications and are being studied in their own right. In this paper we first provide a brief introduction to the issues of interest in random wireless networks. We then discuss some recent results for one-dimensional networks with the nodes distributed uniformly in $(0, z)$.We then discuss some asymptotic results for networks in higher dimensions when the nodes are distributed in a finite volume. Finally we discuss some recent generalisations in considering non uniform transmission ranges and non uniform node distributions. An annotated bibliography of some of the recent literature is also provided.

  17. Metric-Based Cooperative Routing in Multihop Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Xin He

    2012-01-01

    Full Text Available Cooperative communication fully leverages the broadcast nature of wireless channels and exploits time/spatial diversity in a distributed manner, thereby achieving significant improvements in system capacity and transmission reliability. Cooperative diversity has been well studied from the physical layer perspective. Thereafter, cooperative MAC design has also drawn much attention recently. However, very little work has addressed cooperation at the routing layer. In this paper, we propose a simple yet efficient scheme for cooperative routing by using cooperative metrics including packet delivery ratio, throughput, and energy consumption efficiency. To make a routing decision based on our scheme, a node needs to first determine whether cooperation on each link is necessary or not, and if necessary, select the optimal cooperative scheme as well as the optimal relay. To do so, we calculate and compare cooperative routing metric values for each potential relay for each different cooperative MAC scheme (C-ARQ and CoopMAC in this study, and further choose the best value and compare it with the noncooperative link metric. Using the final optimal metric value instead of the traditional metric value at the routing layer, new optimal paths are set up in multihop ad hoc networks, by taking into account the cooperative benefits from the MAC layer. The network performance of the cooperative routing solution is demonstrated using a simple network topology.

  18. On hybrid cooperation in underlay cognitive radio networks

    KAUST Repository

    Mahmood, Nurul Huda

    2013-09-01

    Cooperative communication is a promising strategy to enhance the performance of a communication network as it helps to improve the coverage area and the outage performance. However, such enhancement comes at the expense of increased resource utilization, which is undesirable; more so in the case of opportunistic wireless systems such as cognitive radio networks. In order to balance the performance gains from cooperative communication against the possible over-utilization of resources, we propose and analyze an adaptive-cooperation technique for underlay cognitive radio networks, termed as hybrid-cooperation. Under the proposed cooperation scheme, secondary users in a cognitive radio network cooperate adaptively to enhance the spectral efficiency and the error performance of the network. The bit error rate, the spectral efficiency and the outage performance of the network under the proposed hybrid cooperation scheme with amplify-and-forward relaying are analyzed in this paper, and compared against conventional cooperation technique. Findings of the analytical performance analyses are further validated numerically through selected computer-based Monte-Carlo simulations. The proposed scheme is found to achieve significantly better performance in terms of the spectral efficiency and the bit error rate, compared to the conventional amplify-and-forward cooperation scheme. © 2013 IEEE.

  19. Novel Congestion-Free Alternate Routing Path Scheme using Stackelberg Game Theory Model in Wireless Networks

    Directory of Open Access Journals (Sweden)

    P. Chitra

    2017-04-01

    Full Text Available Recently, wireless network technologies were designed for most of the applications. Congestion raised in the wireless network degrades the performance and reduces the throughput. Congestion-free network is quit essen- tial in the transport layer to prevent performance degradation in a wireless network. Game theory is a branch of applied mathematics and applied sciences that used in wireless network, political science, biology, computer science, philosophy and economics. e great challenges of wireless network are their congestion by various factors. E ective congestion-free alternate path routing is pretty essential to increase network performance. Stackelberg game theory model is currently employed as an e ective tool to design and formulate conges- tion issues in wireless networks. is work uses a Stackelberg game to design alternate path model to avoid congestion. In this game, leaders and followers are selected to select an alternate routing path. e correlated equilibrium is used in Stackelberg game for making better decision between non-cooperation and cooperation. Congestion was continuously monitored to increase the throughput in the network. Simulation results show that the proposed scheme could extensively improve the network performance by reducing congestion with the help of Stackelberg game and thereby enhance throughput.

  20. Performance Analysis of Wireless Networks With MDQOS

    Directory of Open Access Journals (Sweden)

    A. Leelavathi

    2014-07-01

    Full Text Available In Wireless/Mobile networks various kinds of encoding schemes were used for transmission of data over a bandwidth. The desired quality and generated traffic varies with the requirement with this bandwidth. A generic video telephony may require more than 40 kbps whereas a low motion video telephony may require about 25 kbps for data transmission. From the designing point of view these requirements demands for an alternative resource planning, especially for bandwidth allocation in wireless networks. In wireless network where bandwidth is a scare resource, the system may need to block incoming user if all of the bandwidth has been used to provide highest quality of service to existing users. However this bandwidth resource planning may be unacceptable for larger application. A degradable approach to multiple users can be made on bandwidth allocation to reduce the blocking probability without degrading the quality of service to existing users. This work aims towards a realization of a wireless/mobile network using W-CDMA multi access technique supporting multilevel quality of services. The bandwidth allocation to multiple users is adjusted dynamically according to the required network condition so as to increase bandwidth utilization. The work analyze the performance deriving the degradation period ratio, mean degradation time and degradation state for the implemented wireless network.The proposed work is aim to implement on Matlab tool for its functional verification considering various mobility patterns

  1. Voice over IP in Wireless Heterogeneous Networks

    DEFF Research Database (Denmark)

    Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee

    The convergence of different types of traffic has preceded the convergence of systems and services in a wireless heterogeneous network. Voice and data traffic are usually treated separate in both 2G and 2.5G wireless networks. With advances in packet switching technology and especially with the d...... and to the discruption caused by the user mobility during the session. Voice over IP in Wireless Hetetrogeneous Networks thus investigates and proposes cross-layer techniques for realizing time-efficient control mechanisms for VoIP: signaling, mobility and security.......The convergence of different types of traffic has preceded the convergence of systems and services in a wireless heterogeneous network. Voice and data traffic are usually treated separate in both 2G and 2.5G wireless networks. With advances in packet switching technology and especially....... The focus of Voice over IP in Wierless Heterogeneous Networks is on mechanisms that affect the VoIP user satisfaction  while not explicitly involved in the media session. This relates to the extra delays introduced by the security and the signaling protocols used to set up an authorized VoIP session...

  2. Cooperative Power Saving Strategies for IP-Services Supported over DVB-H Networks

    DEFF Research Database (Denmark)

    Zhang, Qi; Fitzek, F.H.P.; Katz, Marcos

    2007-01-01

    This paper introduces power saving strategies for cooperative wireless communication systems. The described scenario focuses on IP-services over DVB-H networks showing the strength of non-altruistic cooperation between mobile devices. The envisioned cooperation is based on cellular reception of d...

  3. An inter-networking mechanism with stepwise synchronization for wireless sensor networks.

    Science.gov (United States)

    Yamamoto, Hiroshi; Wakamiya, Naoki; Murata, Masayuki

    2011-01-01

    To realize the ambient information society, multiple wireless networks deployed in the region and devices carried by users are required to cooperate with each other. Since duty cycles and operational frequencies are different among networks, we need a mechanism to allow networks to efficiently exchange messages. For this purpose, we propose a novel inter-networking mechanism where two networks are synchronized with each other in a moderate manner, which we call stepwise synchronization. With our proposal, to bridge the gap between intrinsic operational frequencies, nodes near the border of networks adjust their operational frequencies in a stepwise fashion based on the pulse-coupled oscillator model as a fundamental theory of synchronization. Through simulation experiments, we show that the communication delay and the energy consumption of border nodes are reduced, which enables wireless sensor networks to communicate longer with each other.

  4. Sensor Fusion-based Event Detection in Wireless Sensor Networks

    NARCIS (Netherlands)

    Bahrepour, M.; Meratnia, N.; Havinga, P.J.M.

    2009-01-01

    Recently, Wireless Sensor Networks (WSN) community has witnessed an application focus shift. Although, monitoring was the initial application of wireless sensor networks, in-network data processing and (near) real-time actuation capability have made wireless sensor networks suitable candidate for ev

  5. Mobile Assisted Security in Wireless Sensor Networks

    Science.gov (United States)

    2015-08-03

    connected to a D-Link DIR-615 v.E3 Wireless Router as shown in Figure 1. The router used in the experiments was a D-Link DIR- 615rev.E3 which is fairly...connected through wireless to the D-Link Wi-Fi Router . The network traffic monitoring device is connected to the router via an ethernet cable to...enhance the packet forwarding performance of router and not to effect the wireless spectrum capacity that is used for streaming with Chromecast and Tablet

  6. Network Coding for Wireless Cooperative Networks

    DEFF Research Database (Denmark)

    Khamfroush, Hana; Roetter, Daniel Enrique Lucani; Barros, João

    2014-01-01

    from the optimal policy and devise two simple, yet powerful heuristics that are useful in practice. Our heuristics rely on different levels of feedback, namely, sending 1 or 2 feedback packets per receiver per M data packets by choosing the right moment to send this feedback. Our numerical results show...

  7. Wireless Sensor Networks for Ambient Assisted Living

    Directory of Open Access Journals (Sweden)

    Raúl Aquino-Santos

    2013-11-01

    Full Text Available This paper introduces wireless sensor networks for Ambient Assisted Living as a proof of concept. Our workgroup has developed an arrhythmia detection algorithm that we evaluate in a closed space using a wireless sensor network to relay the information collected to where the information can be registered, monitored and analyzed to support medical decisions by healthcare providers. The prototype we developed is then evaluated using the TelosB platform. The proposed architecture considers very specific restrictions regarding the use of wireless sensor networks in clinical situations. The seamless integration of the system architecture enables both mobile node and network configuration, thus providing the versatile and robust characteristics necessary for real-time applications in medical situations. Likewise, this system architecture efficiently permits the different components of our proposed platform to interact efficiently within the parameters of this study.

  8. Energy-efficient wireless mesh networks

    CSIR Research Space (South Africa)

    Ntlatlapa, N

    2007-06-01

    Full Text Available ­deficient areas such as rural areas in  Africa.  Index   Terms—Energy   efficient   design,   Wireless  Mesh networks, Network Protocols I. INTRODUCTION The  objectives  of   this   research  group   are   the  application   and   adaptation   of   existing   wireless  local   area...   networks,   especially   those   based   on  802.11 standard, for   the energy­efficient  wireless  mesh network (EE­WMN) architectures, protocols  and   controls.   In   addition   to   the   WMN   regular  features   of   self...

  9. Secure Routing in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Soumyashree Sahoo

    2012-01-01

    Full Text Available Wireless sensor networks is the new concept in the field of networks consists of small, large number of sensing nodes which is having the sensing, computational and transmission power. Due to lack of tamper-resistant infrastructure and the insecure nature of wireless communication channels, these networks are vulnerable to internal and external attacks. Key Management is a major challenge to achieve security in wireless sensor networks. Key management includes the process of key setup, the initial distribution of keys and keys revocation. To provide security and proper routing or communication should be encrypted and authenticated. It is not easy to achieve secure key establishment without public key cryptography. In this thesis, some key management schemes have been purposed which will be valuable for secure routing between different sensor nodes.

  10. Load balancing in integrated optical wireless networks

    DEFF Research Database (Denmark)

    Yan, Ying; Dittmann, Lars; Wong, S-W.;

    2010-01-01

    In this paper, we tackle the load balancing problem in Integrated Optical Wireless Networks, where cell breathing technique is used to solve congestion by changing the coverage area of a fully loaded cell tower. Our objective is to design a load balancing mechanism which works closely with the in......In this paper, we tackle the load balancing problem in Integrated Optical Wireless Networks, where cell breathing technique is used to solve congestion by changing the coverage area of a fully loaded cell tower. Our objective is to design a load balancing mechanism which works closely...... issues are outlined and a cost function based optimization model is developed for power management. In particularly, two alternative feedback schemes are proposed to report wireless network status. Simulation results show that our proposed load balancing mechanism improves network performances....

  11. Multilayer Statistical Intrusion Detection in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Noureddine Boudriga

    2008-12-01

    Full Text Available The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs. This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The architecture is adequate to wireless networks because the underlying detection models rely on radio parameters and traffic models. Accurate correlation between radio and traffic anomalies allows enhancing the efficiency of the IDS. A radio signal fingerprinting technique based on the maximal overlap discrete wavelet transform (MODWT is developed. Moreover, a geometric clustering algorithm is presented. Depending on the characteristics of the fingerprinting technique, the clustering algorithm permits to control the false positive and false negative rates. Finally, simulation experiments have been carried out to validate the proposed IDS.

  12. An Energy-saving On-demand Scheduling Cooperative MAC Protocol in Wireless Sensor Networks%WSN 中一种节能的按需调度协作式 MAC 协议研究

    Institute of Scientific and Technical Information of China (English)

    卫小伟

    2016-01-01

    The energy hole problem limits the lifetime of battery powered multi‐hop wireless sensor networks(WSNs) . To solve this problem ,An On‐demand Scheduling Cooperative MAC protocol(ODSC‐MAC) is proposed .By combining an on‐demand strategy and sensor cooperation intended to extend range ,ODSC‐MAC tackles the spatio‐temporal challenges for performing cooperative transmission(CT ) in multi‐hop WSN ,to prolong the lifetime of the network .In addition ,orthogonal and pipelined duty‐cycle scheduling are used for reducing the traffic contention ,and a reservation‐based wake‐up scheme is devised to bring cooperating nodes into temporary synchrony to support CT range extension .Compared with existing MAC protocols ,our NS‐2 simulations with REACT show that while explicitly accounting for the overhead of CT and practical fail‐ures of control packets in dense traffic ,ODSC‐MAC still gives almost 80% increase in network lifetime .%能量空洞问题影响了由电池供电的多跳无线传感器网络的寿命。为此,论文提出一种按需调度协作式 MAC协议(ODSC‐MAC),综合采用按需策略及可扩展(传输)范围的传感器协作机制,ODSC‐MAC 协议解决了多跳 WSN 网络进行协作式传输(CT )时存在的时空问题,延长了网络寿命。另外,采用正交管线占空比调度以缓解流量竞争,同时设计了一种基于预定策略的唤醒机制以使协作节点时间同步,并为 CT 传输范围扩展提供支持。与现有的 MAC 协议相比,基于 RE‐ACT 的 NS‐2仿真结果表明,该协议既明确考虑了 CT 传输的开销及流量密集时控制报文的实际故障,又使网络运行时间提升了近80%。

  13. Wireless vehicular networks for car collision avoidance

    CERN Document Server

    2013-01-01

    Wireless Vehicular Networks for Car Collision Avoidance focuses on the development of the ITS (Intelligent Transportation Systems) in order to minimize vehicular accidents. The book presents and analyses a range of concrete accident scenarios while examining the causes of vehicular collision and proposing countermeasures based on wireless vehicular networks. The book also describes the vehicular network standards and quality of service mechanisms focusing on improving critical dissemination of safety information. With recommendations on techniques and protocols to consider when improving road safety policies in order to minimize crashes and collision risks.

  14. Asymmetrical Modulation for Uplink Communication in Cooperative Networks

    DEFF Research Database (Denmark)

    Zhang, Qi; Fitzek, Frank H.P.; Iversen, Villy Bæk

    2008-01-01

    In this paper a spectrum efficient uplink communication method for cooperative wireless networks is presented. In cellular controlled peer to peer (CCP2P) cooperative wireless networks the mobile device is logically connected over cellular links with the base station and simultaneously over short......-range links with neighboring mobile devices to form cooperative clusters. So far the physical communication over cellular links and over short-range links are separated in time or in frequency. Beyond this state of the art, we exploit a method, referred to as asymmetrical modulation, where a mobile device...... information, the neighboring devices are getting the fine grained information reading between the lines. Our analytical analysis and simulation results show that asymmetrical modulation can improve the spectrum efficiency and reduce the data queuing delay with neither degrading the symbol error rate...

  15. Hybrid RRM Architecture for Future Wireless Networks

    DEFF Research Database (Denmark)

    Tragos, Elias; Mihovska, Albena D.; Mino, Emilio

    2007-01-01

    The concept of ubiquitous and scalable system is applied in the IST WINNER II [1] project to deliver optimum performance for different deployment scenarios from local area to wide area wireless networks. The integration of cellular and local area networks in a unique radio system will provide a g...

  16. IPv6 for Future Wireless Networks

    DEFF Research Database (Denmark)

    Nielsen, Thomas Toftegaard

    2001-01-01

    enhancedfunctionalities requested for the future mobile systems. In this article thelargest advantages in relation to mobile systems are presented. Variousaspects of introducing IP throughout the entire mobile network (core, accessand termainals) are also presented along with an illustration of the abilitiesof the future...... wireless network....

  17. Service discovery in heterogeneous wireless networks

    NARCIS (Netherlands)

    Blangé, M.J.; Karkowski, I.P.; Vermeulen, B.C.B.

    2005-01-01

    In this paper we describe a possible solution to the problem of service discovery in heterogeneous wireless networks. This solution involves introduction of a network independent service discovery layer, with as main goal the improved robustness of applications running on top of it. A possible imple

  18. Wireless Sensor Networks : Structure and Algorithms

    NARCIS (Netherlands)

    van Dijk, T.C.

    2014-01-01

    In this thesis we look at various problems in wireless networking. First we consider two problems in physical-model networks. We introduce a new model for localisation. The model is based on a range-free model of radio transmissions. The first scheme is randomised and we analyse its expected perform

  19. Energy-Harvesting Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Vuckovic, Dusan; Di Mauro, Alessio

    2012-01-01

    Energy Harvesting comprises a promising solution to one of the key problems faced by battery-powered Wireless Sensor Networks, namely the limited nature of the energy supply (finite battery capacity). By harvesting energy from the surrounding environment, the sensors can have a continuous lifetime...... Sensor Networks with energy harvesting capability....

  20. Energy-efficient adaptive wireless network design

    NARCIS (Netherlands)

    Havinga, Paul J.M.; Smit, Gerardus Johannes Maria; Bos, M.

    Energy efficiency is an important issue for mobile computers since they must rely on their batteries. We present an energy-efficient highly adaptive architecture of a network interface and novel data link layer protocol for wireless networks that provides quality of service (QoS) support for diverse

  1. Wireless Sensor Networks : Structure and Algorithms

    NARCIS (Netherlands)

    van Dijk, T.C.

    2014-01-01

    In this thesis we look at various problems in wireless networking. First we consider two problems in physical-model networks. We introduce a new model for localisation. The model is based on a range-free model of radio transmissions. The first scheme is randomised and we analyse its expected

  2. Flexible network wireless transceiver and flexible network telemetry transceiver

    Science.gov (United States)

    Brown, Kenneth D.

    2008-08-05

    A transceiver for facilitating two-way wireless communication between a baseband application and other nodes in a wireless network, wherein the transceiver provides baseband communication networking and necessary configuration and control functions along with transmitter, receiver, and antenna functions to enable the wireless communication. More specifically, the transceiver provides a long-range wireless duplex communication node or channel between the baseband application, which is associated with a mobile or fixed space, air, water, or ground vehicle or other platform, and other nodes in the wireless network or grid. The transceiver broadly comprises a communication processor; a flexible telemetry transceiver including a receiver and a transmitter; a power conversion and regulation mechanism; a diplexer; and a phased array antenna system, wherein these various components and certain subcomponents thereof may be separately enclosed and distributable relative to the other components and subcomponents.

  3. Effect of mobility models on infrastructure based wireless networks ...

    African Journals Online (AJOL)

    Effect of mobility models on infrastructure based wireless networks. ... In this paper, the effect of handoff procedure on the performance of random mobile nodes in wireless networks was investigated. Mobility of node is defined ... Article Metrics.

  4. Applications of Wireless Sensor Network in Smart Grid

    National Research Council Canada - National Science Library

    Huijun Xu

    2013-01-01

    .... In this paper, we firstly analyzed the characteristics and structures of the smart grid and wireless sensor network, then brought out the applications of wireless sensor network in the smart grid...

  5. Artificial intelligence based event detection in wireless sensor networks

    NARCIS (Netherlands)

    Bahrepour, M.

    2013-01-01

    Wireless sensor networks (WSNs) are composed of large number of small, inexpensive devices, called sensor nodes, which are equipped with sensing, processing, and communication capabilities. While traditional applications of wireless sensor networks focused on periodic monitoring, the focus of more

  6. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  7. Cooperative Mobile Sensing Networks

    Energy Technology Data Exchange (ETDEWEB)

    Roberts, R S; Kent, C A; Jones, E D; Cunningham, C T; Armstrong, G W

    2003-02-10

    A cooperative control architecture is presented that allows a fleet of Unmanned Air Vehicles (UAVs) to collect data in a parallel, coordinated and optimal manner. The architecture is designed to react to a set of unpredictable events thereby allowing data collection to continue in an optimal manner.

  8. Efficient Wireless Charger Deployment for Wireless Rechargeable Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jehn-Ruey Jiang

    2016-08-01

    Full Text Available A wireless rechargeable sensor network (WRSN consists of sensor nodes that can harvest energy emitted from wireless chargers for refilling their batteries so that the WRSN can operate sustainably. This paper assumes wireless chargers are equipped with directional antennas, and are deployed on grid points of a fixed height to propose two heuristic algorithms solving the following wireless charger deployment optimization (WCDO problem: how to deploy as few as possible chargers to make the WRSN sustainable. Both algorithms model the charging space of chargers as a cone and calculate charging efficiency according power regression expressions complying with the Friis transmission equation. The two algorithms are the greedy cone covering (GCC algorithm and the adaptive cone covering (ACC algorithm. The GCC (respectively, ACC algorithm greedily (respectively, adaptively generates candidate cones to cover as many as possible sensor nodes. Both algorithms then greedily select the fewest number of candidate cones, each of which corresponds to the deployment of a charger, to have approximate solutions to the WCDO problem. We perform experiments, conduct simulations and do analyses for the algorithms to compare them in terms of the time complexity, the number of chargers deployed, and the execution time.

  9. Vehicle Identification using Discrete Spectrums in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Seung S. Yang

    2008-04-01

    Full Text Available We studied the possibility of using wireless sensor networks for vehicle identification in a large open field. This is exciting research in that it not only presents a challenge but has practicality. The challenge here is to develop algorithms and/or protocols for sensor nodes to execute a given task. Since each sensor node has limited computation and communication capabilities, these limitations prohibit the use of algorithms and/or protocols developed for conventional computers and networks. Each sensor is dispensable and easily deployable, it can do meaningful work when it is collaborated as a networked cluster; therefore it is very practical in application. Our goal is to identify vehicles in real time using acoustic signal sensors and wireless networks. Our contribution in this paper is three fold. First, we developed a simple vehicle sound identification algorithm enough to be implemented for capacity limited sensor nodes. Second, we proposed architecture and protocols of wireless sensor networks for vehicle identification using this developed sound classification algorithm. Third, we proposed a cooperation model among sensors to expedite the classification process. Our preliminary results show the proposed architecture and protocols are promising.

  10. Data Dissemination in Wireless Networks with Network Coding

    CERN Document Server

    Firooz, Mohammad H

    2012-01-01

    We investigate the use of network coding for information dissemination over a wireless network. Using network coding allows for a simple, distributed and robust algorithm where nodes do not need any information from their neighbors. In this paper, we analyze the time needed to diffuse information throughout a network when network coding is implemented at all nodes. We then provide an upper bound for the dissemination time for ad-hoc networks with general topology. Moreover, we derive a relation between dissemination time and the size of the wireless network. It is shown that for a wireless network with N nodes, the dissemination latency is between O(N) and O(N^2), depending on the reception probabilities of the nodes. These observations are validated by the simulation results.

  11. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  12. Ultra wideband technology for wireless sensor networks

    Science.gov (United States)

    Wang, Yue; Xiong, Weiming

    2011-08-01

    Wireless sensor networks (WSNs) have emerged as an important method for planetary surface exploration. To investigate the optimized wireless technology for WSNs, we summarized the key requirements of WSNs and justified ultra wideband (UWB) technology by comparing with other competitive wireless technologies. We also analyzed network topologies as well as physical and MAC layer designs of IEEE 802.15.4a standard, which adopted impulse radio UWB (IR-UWB) technology. Our analysis showed that IR-UWB-based 802.15.4a standard could enable robust communication, precise ranging, and heterogeneous networking for WSNs applications. The result of our present work implies that UWB-based WSNs can be applied to future planetary surface exploration.

  13. Emulating Wired Backhaul with Wireless Network Coding

    DEFF Research Database (Denmark)

    Thomsen, Henning; De Carvalho, Elisabeth; Popovski, Petar

    2014-01-01

    of the two-way protocol. The transmit power is set high enough to enable successive decoding at the small cell base station where the downlink data to the user is first decoded and its contribution removed from the received signal followed by the uplink data from the user. The decoding of the second layer......In this paper we address the need for wireless network densification. We propose a solution wherein the wired backhaul employed in heterogeneous cellular networks is replaced with wireless links, while maintaining the rate requirements of the uplink and downlink traffic of each user. The first......, the uplink traffic to the user, remains identical to the one performed in a wired system. In the broadcast phase, the decoding of the downlink traffic can also be guaranteed to remain identical. Hence, our solution claims an emulation of a wired backhaul with wireless network coding with same performance. We...

  14. Wireless Mesh Network Routing Under Uncertain Demands

    Science.gov (United States)

    Wellons, Jonathan; Dai, Liang; Chang, Bin; Xue, Yuan

    Traffic routing plays a critical role in determining the performance of a wireless mesh network. Recent research results usually fall into two ends of the spectrum. On one end are the heuristic routing algorithms, which are highly adaptive to the dynamic environments of wireless networks yet lack the analytical properties of how well the network performs globally. On the other end are the optimal routing algorithms that are derived from the optimization problem formulation of mesh network routing. They can usually claim analytical properties such as resource use optimality and throughput fairness. However, traffic demand is usually implicitly assumed as static and known a priori in these problem formulations. In contrast, recent studies of wireless network traces show that the traffic demand, even being aggregated at access points, is highly dynamic and hard to estimate. Thus, to apply the optimization-based routing solution in practice, one must take into account the dynamic and uncertain nature of wireless traffic demand. There are two basic approaches to address the traffic uncertainty in optimal mesh network routing (1) predictive routing that infers the traffic demand with maximum possibility based in its history and optimizes the routing strategy based on the predicted traffic demand and (2) oblivious routing that considers all the possible traffic demands and selects the routing strategy where the worst-case network performance could be optimized. This chapter provides an overview of the optimal routing strategies for wireless mesh networks with a focus on the above two strategies that explicitly consider the traffic uncertainty. It also identifies the key factors that affect the performance of each routing strategy and provides guidelines towards the strategy selection in mesh network routing under uncertain traffic demands.

  15. Decentralized Cooperative Networking

    Science.gov (United States)

    2012-02-24

    protocols (such as DSR and AODV ) where route request (RREQ) and route reply (RREP) control packets are transmitted via SISO transmissions. Then, specific... routing . To make the routing protocol scalable, M-group Dis-STBC is applied, and an analysis of the cooperative transmission range is provided to guide...higher throughput in comparison to a Single-Input-Single-Output (SISO) based routing protocol . On the other hand, because LACR is designed to

  16. Throughput Characterization for Cooperative Wireless Information Transmission with RF Energy Harvesting-Based Relay

    Directory of Open Access Journals (Sweden)

    Yuanyuan Yao

    2016-01-01

    Full Text Available The simultaneous wireless information and power transfer (SWIPT in a cooperative relaying system is investigated, where the relay node is self-sustained by harvesting radiofrequency (RF energy from the source node. In this paper, we propose a time switching and power splitting (TSPS protocol for the cooperative system with a mobile destination node. In the first part of the transmission slot, a portion of the received signal power is used for energy transfer, and the remaining power is used for information transmission from the source to the relay. For the remaining time of the transmission slot, information is transmitted from the relay to a mobile destination node. To coordinate the wireless information and power transfer, two transmission modes are investigated, namely, relay-assisted transmission mode and nonrelay mode, respectively. Under these two modes, the outage probability and the network throughput are characterized. By joint optimization of the power splitting and the time switching ratios, we further compare the network throughput under the two transmission modes with different parameters. Results indicate that the relay-assisted transmission mode significantly improves the throughput of the wireless network.

  17. Energy Consumption of Wireless Network Access Points

    OpenAIRE

    ANDRADE MORELLI, SEBASTIÁN; RUIZ SANCHEZ, EDUARDO; GRANELL ROMERO, EMILIO; Lloret, Jaime

    2013-01-01

    2nd International Conference on Green Communications and Networking, GreeNets 2012; Gandia; Spain; 25 October 2012 through 26 October 2012 The development of low cost technology based on IEEE 802.11 standard permits to build telecommunication networks at low cost, allowing providing Internet access in rural areas in developing countries. The lack of access to the electrical grid is a problem when the network is being developed in rural areas, so that wireless access points should operate u...

  18. Human-Centric Wireless Communication Networks

    OpenAIRE

    Cavallari, Riccardo

    2016-01-01

    This thesis covers two main topics: the design and performance evaluation of Wireless Body Area Networks (WBANs), and the simulation and mathematical modeling of Delay Tolerant Networks (DTNs). Different Medium Access Control (MAC) protocols for WBANs are implemented on dedicated hardware in order to evaluate, through extensive measurement campaigns, the performance of the network in terms of packet loss rate, delay and energy consumption. Novel solutions to cope with bo...

  19. Interference Alignment in Dense Wireless Networks

    CERN Document Server

    Niesen, Urs

    2009-01-01

    We consider arbitrary dense wireless networks, in which $n$ nodes are placed in an arbitrary (deterministic) manner on a square region of unit area and communicate with each other over Gaussian fading channels. We provide inner and outer bounds for the $n\\times n$-dimensional unicast and the $n\\times 2^n$-dimensional multicast capacity regions of such a wireless network. These inner and outer bounds differ only by a factor $O(\\log(n))$, yielding a fairly tight scaling characterization of the entire regions. The communication schemes achieving the inner bounds use interference alignment as a central technique and are surprisingly simple.

  20. Stochastic Congestion Control in Wireless Sensor Networks

    Science.gov (United States)

    Kim, Hyung Seok; Lee, Seok; Kim, Namhoon

    In this paper, an effective congestion control algorithm is proposed to increase the end-to-end delivery success ratio of upstream traffic by reduction of buffer drop probabilities and their deviation in wireless sensor networks. According to the queue length of parent and child nodes, each child node chooses one of the parents as the next hop to the sink and controls the delay before transmission begins. It balances traffics among parents and mitigates congestion based on congestion level of a node. Simulation results show that the proposed algorithm reduces buffer drop probabilities and their deviation and increases the end-to-end delivery success ratio in wireless sensor networks.

  1. Stochastic petri nets for wireless networks

    CERN Document Server

    Lei, Lei; Zhong, Zhangdui

    2015-01-01

    This SpringerBrief presents research in the application of Stochastic Petri Nets (SPN) to the performance evaluation of wireless networks under bursty traffic. It covers typical Quality-of-Service performance metrics such as mean throughput, average delay and packet dropping probability. Along with an introduction of SPN basics, the authors introduce the key motivation and challenges of using SPN to analyze the resource sharing performance in wireless networks. The authors explain two powerful modeling techniques that treat the well-known state space explosion problem: model decomposition and

  2. Future Wireless Networks and Information Systems Volume 1

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in ICFWI 2011 conference. The 2011 International Conference on Future Wireless Networks and Information Systems (ICFWI 2011) has been held on November 30 ~ December 1, 2011, Macao, China. Topics covered include Wireless Information Networks, Wireless Networking Technologies, Mobile Software and Services, intelligent computing, network management, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Wireless Networks and Information Systems and also serve as an excellent reference work for researchers and graduate students working on Wireless Networks and Information Systems.

  3. Cluster-based Intrusion Detection in Wireless Ad-Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    Di Wu; Zhisheng Liu; Yongxin Feng; Guangxing Wang

    2004-01-01

    There are inherent vulnerabilities that are not easily preventable in the mobile Ad-Hoc networks.To build a highly secure wireless Ad-Hoc network,intrusion detection and response techniques need to be deployed;The intrusion detection and cluster-based Ad-Hoc networks has been introduced,then,an architecture for better intrusion detection based on cluster using Data Mining in wireless Ad-Hoc networks has been shown. A statistical anomaly detection approach has been used.The anomaly detection and trace analysis have been done locally in each node and possibly through cooperation with clusterhead detection in the network.

  4. Optimized and Executive Survey of Physical Node Capture Attack in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Bhavana Butani

    2014-10-01

    Full Text Available Wireless sensor networks (WSNs are novel large-scale wireless networks that consist of distributed, self organizing, low-power, low-cost, tiny sensor devices to cooperatively collect information through infrastructure less wireless networks. These networks are envisioned to play a crucial role in variety of applications like critical military surveillance applications, forest fire monitoring, commercial applications such as building security monitoring, traffic surveillance, habitat monitoring and smart homes and many more scenarios. Node capture attack is one of the most dreadful security attack exist in wireless sensor networks. An adversary steals cryptographic key or other confidential information like node’s id etc from a captured node to compromise entire network. So, Security of wireless sensor network is an important issue for maintaining confidentiality and integrity of wireless links. Now-a-days, researchers are paying attention towards developing security schemes against Node capture attack. Our survey provides deep insights of existing techniques that enhance the attacking efficiency of the node capture attack in wireless sensor network. It also analyzes various detection and key pre-distribution schemes for inventing a new scheme to improve resilience against node capture attack.

  5. Network coding at different layers in wireless networks

    CERN Document Server

    2016-01-01

    This book focuses on how to apply network coding at different layers in wireless networks – including MAC, routing, and TCP – with special focus on cognitive radio networks. It discusses how to select parameters in network coding (e.g., coding field, number of packets involved, and redundant information ration) in order to be suitable for the varying wireless environments. The book explores how to deploy network coding in MAC to improve network performance and examines joint network coding with opportunistic routing to improve the successful rate of routing. In regards to TCP and network coding, the text considers transport layer protocol working with network coding to overcome the transmission error rate, particularly with how to use the ACK feedback of TCP to enhance the efficiency of network coding. The book pertains to researchers and postgraduate students, especially whose interests are in opportunistic routing and TCP in cognitive radio networks.

  6. Cooperation Networks: Endogeneity and Complexity

    CERN Document Server

    Angus, S

    2006-01-01

    Insights from the Complex Systems literature are employed to develop a computational model of truly endogenous strategic network formation. Artificial Adaptive Agents, implemented as Finite State Automata (FSA), play a modified two-player IPD game with an option to further develop the interaction space as part of their strategy. Several insights result from this minor modification: first, I find that network formation is a necessary condition for cooperation to be sustainable but that both the frequency of interaction and the degree to which edge formation impacts agent mixing are both necessary conditions for cooperative networks. Second, within the FSA-modified IPD frame-work, a rich ecology of agents and network topologies is observed and described. Third, the system dynamics are investigated and reveal that initially simple dynamics with small interaction length between agents gives way to complex, a-periodic dynamics with self-organized critical properties when interaction lengths are increased by a sing...

  7. On the Quality of Wireless Network Connectivity

    CERN Document Server

    Dasgupta, Soura

    2011-01-01

    Despite intensive research in the area of network connectivity, there is an important category of problems that remain unsolved: how to measure the quality of connectivity of a wireless multi-hop network which has a realistic number of nodes, not necessarily large enough to warrant the use of asymptotic analysis, and has unreliable connections, reflecting the inherent unreliable characteristics of wireless communications? The quality of connectivity measures how easily and reliably a packet sent by a node can reach another node. It complements the use of \\emph{capacity} to measure the quality of a network in saturated traffic scenarios and provides a native measure of the quality of (end-to-end) network connections. In this paper, we explore the use of probabilistic connectivity matrix as a possible tool to measure the quality of network connectivity. Some interesting properties of the probabilistic connectivity matrix and their connections to the quality of connectivity are demonstrated. We argue that the la...

  8. A COMPARATIVE STUDY IN WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    Hasan Al-Refai

    2014-02-01

    Full Text Available Sensor networks consist of a large number of small, low-powered wireless nodes with limited computation, communication, and sensing abilities, in a battery-powered sensor network, energy and communication bandwidth are a precious resources. Thus, there is a need to adapt the networking process to match the application in order to minimize the resources consumed and extend the life of the network. In this paper, we introduce a comparative study in different routing algorithms that propose vital solutions to the most important issues that should be taken into account when designing wireless network which are reliability, lifetime, communication bandwidth, transmission rand, and finally the limited energy issue, so we will introduce their algorithms and discuss how did they propose to solve such of these challenges and finally we will do some evaluation to each approach.

  9. Game Theory for Wireless Sensor Networks: A Survey

    Science.gov (United States)

    Shi, Hai-Yan; Wang, Wan-Liang; Kwok, Ngai-Ming; Chen, Sheng-Yong

    2012-01-01

    Game theory (GT) is a mathematical method that describes the phenomenon of conflict and cooperation between intelligent rational decision-makers. In particular, the theory has been proven very useful in the design of wireless sensor networks (WSNs). This article surveys the recent developments and findings of GT, its applications in WSNs, and provides the community a general view of this vibrant research area. We first introduce the typical formulation of GT in the WSN application domain. The roles of GT are described that include routing protocol design, topology control, power control and energy saving, packet forwarding, data collection, spectrum allocation, bandwidth allocation, quality of service control, coverage optimization, WSN security, and other sensor management tasks. Then, three variations of game theory are described, namely, the cooperative, non-cooperative, and repeated schemes. Finally, existing problems and future trends are identified for researchers and engineers in the field. PMID:23012533

  10. Game theory for Wireless Sensor Networks: a survey.

    Science.gov (United States)

    Shi, Hai-Yan; Wang, Wan-Liang; Kwok, Ngai-Ming; Chen, Sheng-Yong

    2012-01-01

    Game theory (GT) is a mathematical method that describes the phenomenon of conflict and cooperation between intelligent rational decision-makers. In particular, the theory has been proven very useful in the design of wireless sensor networks (WSNs). This article surveys the recent developments and findings of GT, its applications in WSNs, and provides the community a general view of this vibrant research area. We first introduce the typical formulation of GT in the WSN application domain. The roles of GT are described that include routing protocol design, topology control, power control and energy saving, packet forwarding, data collection, spectrum allocation, bandwidth allocation, quality of service control, coverage optimization, WSN security, and other sensor management tasks. Then, three variations of game theory are described, namely, the cooperative, non-cooperative, and repeated schemes. Finally, existing problems and future trends are identified for researchers and engineers in the field.

  11. Mobile Anchor Assisted Node Localization for Wireless Sensor Networks

    CERN Document Server

    Chen, Hongyang; Huang, Pei; Poor, H Vincent; Sezaki, Kaoru

    2009-01-01

    In this paper, a cooperative localization algorithm is proposed that considers the existence of obstacles in mobilityassisted wireless sensor networks (WSNs). In this scheme, a mobile anchor (MA) node cooperates with static sensor nodes and moves actively to refine location performance. The localization accuracy of the proposed algorithm can be improved further by changing the transmission range of mobile anchor node. The algorithm takes advantage of cooperation betweenMAs and static sensors while, at the same time, taking into account the relay node availability to make the best use of beacon signals. For achieving high localization accuracy and coverage, a novel convex position estimation algorithm is proposed, which can effectively solve the localization problem when infeasible points occur because of the effects of radio irregularity and obstacles. This method is the only range-free based convex method to solve the localization problem when the feasible set of localization inequalities is empty. Simulatio...

  12. Game Theory for Wireless Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Ngai-Ming Kwok

    2012-07-01

    Full Text Available Game theory (GT is a mathematical method that describes the phenomenon of conflict and cooperation between intelligent rational decision-makers. In particular, the theory has been proven very useful in the design of wireless sensor networks (WSNs. This article surveys the recent developments and findings of GT, its applications in WSNs, and provides the community a general view of this vibrant research area. We first introduce the typical formulation of GT in the WSN application domain. The roles of GT are described that include routing protocol design, topology control, power control and energy saving, packet forwarding, data collection, spectrum allocation, bandwidth allocation, quality of service control, coverage optimization, WSN security, and other sensor management tasks. Then, three variations of game theory are described, namely, the cooperative, non-cooperative, and repeated schemes. Finally, existing problems and future trends are identified for researchers and engineers in the field.

  13. Securing Wireless Sensor Networks: Security Architectures

    Directory of Open Access Journals (Sweden)

    David Boyle

    2008-01-01

    Full Text Available Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limited only by what can be technologically sensed, it is envisaged that wireless sensor networks will play an important part in our daily lives in the foreseeable future. Privy to many types of sensitive information, both sensed and disseminated, there is a critical need for security in a number of applications related to this technology. Resulting from the continuous debate over the most effective means of securing wireless sensor networks, this paper considers a number of the security architectures employed, and proposed, to date, with this goal in sight. They are presented such that the various characteristics of each protocol are easily identifiable to potential network designers, allowing a more informed decision to be made when implementing a security protocol for their intended application. Authentication is the primary focus, as the most malicious attacks on a network are the work of imposters, such as DOS attacks, packet insertion etc. Authentication can be defined as a security mechanism, whereby, the identity of a node in the network can be identified as a valid node of the network. Subsequently, data authenticity can be achieved; once the integrity of the message sender/receiver has been established.

  14. Reliable Communication in Wireless Meshed Networks using Network Coding

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Paramanathan, Achuthan; Hundebøll, Martin

    2012-01-01

    The advantages of network coding have been extensively studied in the field of wireless networks. Integrating network coding with existing IEEE 802.11 MAC layer is a challenging problem. The IEEE 802.11 MAC does not provide any reliability mechanisms for overheard packets. This paper addresses...

  15. Dialable Cryptography for Wireless Networks

    Science.gov (United States)

    2008-03-01

    www.ansi.org/. 3. Bandera , C., et al., Wireless Just-in-Time Training of Mobile Skilled Support Personnel. Proc. of SPIE, 2006. (62500R-1). 4. Basagni, S...where she stood up the Information Assurance Office for JSTARS. She later transferred to Kirtland Air Force Base, New Mexico to work with AFOTEC in

  16. Data centric wireless sensor networks

    NARCIS (Netherlands)

    Dulman, S.O.; Havinga, Paul J.M.

    2005-01-01

    The vision of wirteless sensing systems requires the development of devices and technologies that can be pervasive without being intrusive. The basic component of such a smart environment will be a small node with sensing and wireless communications capabilities, able to organize itself flexibly

  17. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  18. Wireless Network Communications Overview for Space Mission Operations

    Science.gov (United States)

    Fink, Patrick W.

    2009-01-01

    The mission of the On-Board Wireless Working Group (WWG) is to serve as a general CCSDS focus group for intra-vehicle wireless technologies. The WWG investigates and makes recommendations pursuant to standardization of applicable wireless network protocols, ensuring the interoperability of independently developed wireless communication assets. This document presents technical background information concerning uses and applicability of wireless networking technologies for space missions. Agency-relevant driving scenarios, for which wireless network communications will provide a significant return-on-investment benefiting the participating international agencies, are used to focus the scope of the enclosed technical information.

  19. Cooperative Team Networks

    Science.gov (United States)

    2016-06-01

    effectiveness, and the ability to experimentally manipulate endogenous team processes . She reviewed the results of a set of experiments in the Hidden...Profile paradigm of team research that examine how endogenous communication processes influence emergent network structure and team performance...experimentally manipulate endogenous team processes . She reviewed the results of a set of experiments in the Hidden Profile paradigm of team research

  20. 采用喷泉码的无线中继比特级信息累积协同通信%Cooperative Relay Bit-level Information Accumulation Transmission Using Fountain Codes for Wireless Networks

    Institute of Scientific and Technical Information of China (English)

    于国海; 王呈贵; 张铁刚

    2011-01-01

    协同中继通信是无线网络中的重要传输方式,为提高系统传输效率,文章将喷泉码引入到协同中继通信中来。在源节点到中继节点的传输阶段,将待发送数据进行LT码编码,减少了反馈信息量;在中继节点到目的节点的传输阶段提出了比特级的Raptor码信息累积方案,使中继节点不需要瞬时信道状态信息就可以使数据传输自适应信道质量。理论分析和仿真结果表明本方案减少了系统传输时间,降低了延时和能量消耗。%Cooperative relay transmission is an important transmission scheme in wireless networks. To further improve transmission efficiency, cooperative relay transmission using fountain codes were analyzed in this paper. In transmission from the source node to the relay node, data were encoded using LT codes; a bit-level Raptor code information accumulated scheme was proposed for transmission from the relay nodes to the destination nodes. This scheme makes the transmission adapt to channel quality without instantaneous channel state information at the relays. Analysis and simulation results show that both the transmission time and energy consumption are reduced.

  1. Problem solving for wireless sensor networks

    CERN Document Server

    Garcia-Hernando, Ana-Belen; Lopez-Navarro, Juan-Manuel; Prayati, Aggeliki; Redondo-Lopez, Luis

    2008-01-01

    Wireless Sensor Networks (WSN) is an area of huge research interest, attracting substantial attention from industry and academia for its enormous potential and its inherent challenges. This reader-friendly text delivers a comprehensive review of the developments related to the important technological issues in WSN.

  2. Benchmarking Block Ciphers for Wireless Sensor Networks

    NARCIS (Netherlands)

    Law, Y.W.; Doumen, J.M.; Hartel, P.H.

    2004-01-01

    Choosing the most storage- and energy-efficient block cipher specifically for wireless sensor networks (WSNs) is not as straightforward as it seems. To our knowledge so far, there is no systematic evaluation framework for the purpose. We have identified the candidates of block ciphers suitable for W

  3. Benchmarking Block Ciphers for Wireless Sensor Networks

    NARCIS (Netherlands)

    Law, Y.W.; Doumen, J.M.; Hartel, Pieter H.

    2004-01-01

    Choosing the most storage- and energy-efficient block cipher specifically for wireless sensor networks (WSNs) is not as straightforward as it seems. To our knowledge so far, there is no systematic evaluation framework for the purpose. We have identified the candidates of block ciphers suitable for

  4. Distributed dynamic load balancing in wireless networks

    NARCIS (Netherlands)

    S.C. Borst (Sem); I. Saniee; P.A. Whiting

    2007-01-01

    htmlabstractSpatial and temporal load variations, e.g. flash overloads and traffic hot spots that persist for minutes to hours, are intrinsic features of wireless networks, and give rise to potentially huge performance repercussions. Dynamic load balancing strategies provide a natural mechanism for

  5. Wireless Network Information Flow: A Deterministic Approach

    CERN Document Server

    Avestimehr, Salman; Tse, David

    2009-01-01

    In contrast to wireline networks, not much is known about the flow of information over wireless networks. The main barrier is the complexity of the signal interaction in wireless channels in addition to the noise in the channel. A widely accepted model is the the additive Gaussian channel model, and for this model, the capacity of even a network with a single relay node is open for 30 years. In this paper, we present a deterministic approach to this problem by focusing on the signal interaction rather than the noise. To this end, we propose a deterministic channel model which is analytically simpler than the Gaussian model but still captures two key wireless channel properties of broadcast and superposition. We consider a model for a wireless relay network with nodes connected by such deterministic channels, and present an exact characterization of the end-to-end capacity when there is a single source and one or more destinations (all interested in the same information) and an arbitrary number of relay nodes....

  6. Wireless sensor networks dynamic runtime configuration

    NARCIS (Netherlands)

    Dulman, S.O.; Hofmeijer, T.J.; Havinga, Paul J.M.

    2004-01-01

    Current Wireless Sensor Networks (WSN) use fixed layered architectures, that can be modified only at compile time. Using a non-layered architecture, which allows dynamic loading of modules and automatic reconfiguration to adapt to the surrounding environment was believed to be too resource consuming

  7. Lifetime Analysis of Reliable Wireless Sensor Networks

    NARCIS (Netherlands)

    Baydere, S.; Safkan, Y.; Durmaz Incel, O.

    2005-01-01

    A wireless sensor network is comprised of a large number of battery-limited sensor nodes communicating with unreliable radio links. The nodes are deployed in an ad hoc fashion and a reverse multicast tree is formed in the target domain. The sink node disseminates a query and collects responses from

  8. Clock Synchronization for Multihop Wireless Sensor Networks

    Science.gov (United States)

    Solis Robles, Roberto

    2009-01-01

    In wireless sensor networks, more so generally than in other types of distributed systems, clock synchronization is crucial since by having this service available, several applications such as media access protocols, object tracking, or data fusion, would improve their performance. In this dissertation, we propose a set of algorithms to achieve…

  9. Wireless Network Security Vulnerabilities and Concerns

    Science.gov (United States)

    Mushtaq, Ahmad

    The dilemma of cyber communications insecurity has existed all the times since the beginning of the network communications. The problems and concerns of unauthorized access and hacking has existed form the time of introduction of world wide web communication and Internet's expansion for popular use in 1990s, and has remained till present time as one of the most important issues. The wireless network security is no exception. Serious and continuous efforts of investigation, research and development has been going on for the last several decades to achieve the goal of provision of 100 percent or full proof security for all the protocols of networking architectures including the wireless networking. Some very reliable and robust strategies have been developed and deployed which has made network communications more and more secure. However, the most desired goal of complete security has yet to see the light of the day. The latest Cyber War scenario, reported in the media of intrusion and hacking of each other's defense and secret agencies between the two super powers USA and China has further aggravated the situation. This sort of intrusion by hackers between other countries such as India and Pakistan, Israel and Middle East countries has also been going on and reported in the media frequently. The paper reviews and critically examines the strategies already in place, for wired network. Wireless Network Security and also suggests some directions and strategies for more robust aspects to be researched and deployed.

  10. SURVEY ON SURVIVAL APPROACHES IN WIRELESS NETWORK AGAINST JAMMING ATTACK

    Directory of Open Access Journals (Sweden)

    FARAZ AHSAN

    2011-08-01

    Full Text Available Wireless networks are more depicted to intentional or unintentional threats than their wired based equivalent networks. Major reason being the wireless medium which can be approached by others, who can listen and interfere in an on-going valid communication. In the absence of a collision detection mechanism and relying mainly on cooperation of each other for packet routing, the standard defined for wireless network is unable to identify any malicious activity, by default. Among attacks the ones which create isolation of the nodes on the network are considered more severe. If they last long enough, can result in denial-of-service and hence network collapses completely. The simplest form of such attacks is jamming attack which can block any current legitimate communication. It is easy to launch as no especial hardware is required and the area in range for a particular time can be jammed for any legal communication. Jamming is a specialized Denial of Service attack in which purpose is not to overflow buffers, instead to choke the physical communication channel, hence avoiding jammer is much harder than other forms of denial of service attacks. Unlike other attacks, especially routing attacks, no network parameter and topology etc need to be known in advance before launching jamming attack. However, if the network parameters are known and the attack is intelligently placed, a jammer can last longer resulting in more survival time on the network and damage. This paper surveys on different types of jamming attack and the mitigation techniques generally used. Besides this, we investigate about the approaches proposed that are considered efficient to survive in a jammed region, actively. Finally, we conclude by highlighting the potential areas which can be targeted to optimize in minimizing the effects of a jamming attack, as future directions.

  11. Power Control in Wireless Sensor Networks with Variable Interference

    Directory of Open Access Journals (Sweden)

    Michele Chincoli

    2016-01-01

    Full Text Available Adaptive transmission power control schemes have been introduced in wireless sensor networks to adjust energy consumption under different network conditions. This is a crucial goal, given the constraints under which sensor communications operate. Power reduction may however have counterproductive effects to network performance. Yet, indiscriminate power boosting may detrimentally affect interference. We are interested in understanding the conditions under which coordinated power reduction may lead to better spectrum efficiency and interference mitigation and, thus, have beneficial effects on network performance. Through simulations, we analyze the performance of sensor nodes in an environment with variable interference. Then we study the relation between transmission power and communication efficiency, particularly in the context of Adaptive and Robust Topology (ART control, showing how appropriate power reduction can benefit both energy and spectrum efficiency. We also identify critical limitations in ART, discussing the potential of more cooperative power control approaches.

  12. Capacity of Wireless Ad Hoc Networks with Opportunistic Collaborative Communications

    Directory of Open Access Journals (Sweden)

    Simeone O

    2007-01-01

    Full Text Available Optimal multihop routing in ad hoc networks requires the exchange of control messages at the MAC and network layer in order to set up the (centralized optimization problem. Distributed opportunistic space-time collaboration (OST is a valid alternative that avoids this drawback by enabling opportunistic cooperation with the source at the physical layer. In this paper, the performance of OST is investigated. It is shown analytically that opportunistic collaboration outperforms (centralized optimal multihop in case spatial reuse (i.e., the simultaneous transmission of more than one data stream is not allowed by the transmission protocol. Conversely, in case spatial reuse is possible, the relative performance between the two protocols has to be studied case by case in terms of the corresponding capacity regions, given the topology and the physical parameters of network at hand. Simulation results confirm that opportunistic collaborative communication is a promising paradigm for wireless ad hoc networks that deserves further investigation.

  13. Security Issues of Wireless Communication Networks

    OpenAIRE

    Alimul Haque; Sinha, A. K.; Singh, K.M.; N. K. Sing

    2014-01-01

    Wireless Communication Networks have attracted a lot of interest in the research community due to their potential applicability in a wide range of real-world practical applications. However, due to the distributed nature and their deployments in critical applications without human interventions and sensitivity and criticality of data communicated, these networks are vulnerable to numerous security threats that can adversely affect their performance. These issues become even more critical in w...

  14. Current Trends in Wireless Sensor Network Design

    OpenAIRE

    Neha Jain; Agrawal, Dharma P.

    2005-01-01

    The self-organizing nature of sensor networks, their autonomous operation and potential architectural alternatives make them suitable for different data-centric applications. Their wider acceptance seems to be rising on the horizon. In this article, we present an overview of the current state of the art in the field of wireless sensor networks. We also present various open research issues and provide an insight about the latest developments that need to be explored in greater depth that could...

  15. How Effective is Routing for Wireless Networking

    Science.gov (United States)

    2016-03-05

    novel techniques for data- dissemination are being considered, such as efficient flooding [39, 40] or opportunistic routing [41]. Whether it be one of...schemes: control information is disseminated throughout the network to identify a set of links to route data across. This technique for routing in wireless...user only when it has data destined for that user. To find a route , a control packet is flooded across the network that identifies a path towards the

  16. Wireless Sensor Networks for High Fidelity Sampling

    Science.gov (United States)

    2007-07-20

    Seismological Laboratory underground seismometer calibration vault. Testing showed that the SiliconDesigns 1221L devices have a noise floor of 32µG...wireless sensor networks. In SIGCOMM 2006, Pisa, Italy , August 2006. [74] Luigi Rizzo. Effective erasure codes for reliable computer communication proto...Proceedings of the seventh annual international conference on Mobile computing and networking, Rome, Italy , July 2001. [86] Alec Woo, Terence Tong, and

  17. Advanced routing protocols for wireless networks

    CERN Document Server

    Campista , Miguel Elias Mitre

    2014-01-01

    This text introduces the principles of routing protocols and metrics as they affect wireless networking environments, specifically in urban areas. Timely because of the recent rise in small city life, this topic includes the consideration of ad hoc, mesh, vehicular, sensor, and delay tolerant networks. These approaches are each unique, and author Miguel Mitre Campista provides a thorough, but accessible, explanation of their individual characteristics for engineers, computer scientists, IT professionals, and curious Internet users.

  18. Intelligent Joint Admission Control for Next Generation Wireless Networks

    OpenAIRE

    Mohsen, Abdulqader M.; Al-Akwaa, Fadhl M.; Mohammed M. Alkhawlani

    2012-01-01

    The Heterogeneous Wireless Network (HWN) integrates different wireless networks into one common network. The integrated networks often overlap coverage in the same wireless service areas, leading to the availability of a great variety of innovative services based on user demands in a cost-efficient manner. Joint Admission Control (JAC) handles all new or handoff service requests in the HWN. It checks whether the incoming service request to the selected Radio Access Network (RAN) by the initia...

  19. Reliability and Feedback of Multiple Hop Wireless Networks

    Institute of Scientific and Technical Information of China (English)

    N. Eva Wu; Sudha Thavamani; Xiaohua Li

    2007-01-01

    This paper analyzes fault-tolerance over the entire design life of a class of multiple-hop wireless networks, where cooperative transmission schemes are used. The networks are subject to both node failure and random channel fading. A node lifetime distribution is modeled with an increasing failure rate, where the node power consumption level enters the parameters of the distribution. A method for assessing both link and network reliabilities projected at the network's design life is developed. Link reliability is enhanced through use of redundant nodes. The number of redundant nodes is restricted by the cooperative transmission scheme used.The link reliability is then used to establish a re-transmission control policy that minimizes an expected cost involving power, bandwidth expenditures, and packet loss. The benefit and cost of feedback in network operations are examined. The results of a simulation study under specific node processing times are presented. The study quantifies the effect of loop closure frequency, acknowledgment deadline, and nodes' storage capacity on the performance of the network in terms of network lifetime, packet loss rate, and false alarm rate. The study concludes that in a network where energy is severely constrained, feedback must be applied judiciously.

  20. Wireless Local Area Networks: The Next Evolutionary Step.

    Science.gov (United States)

    Wodarz, Nan

    2001-01-01

    The Institute of Electrical and Electronics Engineers recently approved a high-speed wireless standard that enables devices from different manufacturers to communicate through a common backbone, making wireless local area networks more feasible in schools. Schools can now use wireless access points and network cards to provide flexible…

  1. Distributed Estimation, Coding, and Scheduling in Wireless Visual Sensor Networks

    Science.gov (United States)

    Yu, Chao

    2013-01-01

    In this thesis, we consider estimation, coding, and sensor scheduling for energy efficient operation of wireless visual sensor networks (VSN), which consist of battery-powered wireless sensors with sensing (imaging), computation, and communication capabilities. The competing requirements for applications of these wireless sensor networks (WSN)…

  2. System-level Modeling of Wireless Integrated Sensor Networks

    DEFF Research Database (Denmark)

    Virk, Kashif M.; Hansen, Knud; Madsen, Jan

    2005-01-01

    Wireless integrated sensor networks have emerged as a promising infrastructure for a new generation of monitoring and tracking applications. In order to efficiently utilize the extremely limited resources of wireless sensor nodes, accurate modeling of the key aspects of wireless sensor networks i...

  3. Distributed Estimation, Coding, and Scheduling in Wireless Visual Sensor Networks

    Science.gov (United States)

    Yu, Chao

    2013-01-01

    In this thesis, we consider estimation, coding, and sensor scheduling for energy efficient operation of wireless visual sensor networks (VSN), which consist of battery-powered wireless sensors with sensing (imaging), computation, and communication capabilities. The competing requirements for applications of these wireless sensor networks (WSN)…

  4. Partition-based Network Load Balanced Routing in Large Scale Multi-sink Wireless Sensor Networks

    NARCIS (Netherlands)

    Mutter, T.F.

    2009-01-01

    Traditional wireless networks form the wireless counterpart of wired networks, in which providing infrastructure is the main functionality. High bandwidth is the primary goal and the unlimited power supply is an important characteristic of traditional wireless networks. On the other hand, Wireless S

  5. Energy Efficient MAC for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Pekka KOSKELA

    2010-10-01

    Full Text Available This paper considers an overlay solution for asynchronous Medium Access Control (MAC protocols in a duty-cycled wireless sensor network (WSN. The solution extends sleeping times and corrects time drift when the sampling rate is low. The sleeping time is adjusted according to the requisite data sampling rate and the delay requirements of the prevailing application. This and the time drift correction considerably reduced idle listening and thus also decreased power consumption. When the power consumption is reduced, the life of wireless sensor nodes extends.

  6. Game theory for wireless communications and networking

    CERN Document Server

    Zhang, Yan

    2011-01-01

    Used to explain complicated economic behavior for decades, game theory is quickly becoming a tool of choice for those serious about optimizing next generation wireless systems. Illustrating how game theory can effectively address a wide range of issues that until now remained unresolved, Game Theory for Wireless Communications and Networking provides a systematic introduction to the application of this powerful and dynamic tool. This comprehensive technical guide explains game theory basics, architectures, protocols, security, models, open research issues, and cutting-edge advances and applica

  7. Wireless Sensor Network for Medical Applications

    Directory of Open Access Journals (Sweden)

    Hanady S.Ahmed

    2015-06-01

    Full Text Available This work presents a healthcare monitoring system that can be used in an intensive care room. Biological information represented by ECG signals is achieved by ECG acquisition part . AD620 Instrumentation Amplifier selected due to its low current noise. The ECG signals of patients in the intensive care room are measured through wireless nodes. A base node is connected to the nursing room computer via a USB port , and is programmed with a specific firmware. The ECG signals are transferred wirelessly to the base node using nRF24L01+ wireless module. So, the nurse staff has a real time information for each patient available in the intensive care room. A star Wireless Sensor Network is designed for collecting ECG signals . ATmega328 MCU in the Arduino Uno board used for this purpose. Internet for things used For transferring ECG signals to the remote doctor, a Virtual Privet Network is established to connect the nursing room computer and the doctor computer . So, the patients information kept secure. Although the constructed network is tested for ECG monitoring, but it can be used to monitor any other signals.

  8. Wireless sensor networks principles, design and applications

    CERN Document Server

    Yang, Shuang-Hua

    2014-01-01

    Wireless Sensor Networks presents the latest practical solutions to the design issues presented in wireless-sensor-network-based systems. Novel features of the text, distributed throughout, include workable solutions, demonstration systems and case studies of the design and application of wireless sensor networks (WSNs) based on the first-hand research and development experience of the author, and the chapters on real applications: building fire safety protection; smart home automation; and logistics resource management. Case studies and applications illustrate the practical perspectives of: ·         sensor node design; ·         embedded software design; ·         routing algorithms; ·         sink node positioning; ·         co-existence with other wireless systems; ·         data fusion; ·         security; ·         indoor location tracking; ·         integrating with radio-frequency identification; and ·         In...

  9. Quality of service in wireless networks over unlicensed spectrum

    CERN Document Server

    Nahrstedt, Klara

    2011-01-01

    This Synthesis Lecture presents a discussion of Quality of Service (QoS) in wireless networks over unlicensed spectrum. The topic is presented from the point of view of protocols for wireless networks (e.g., 802.11) rather than the physical layer point of view usually discussed for cellular networks in the licensed wireless spectrum. A large number of mobile multimedia wireless applications are being deployed over WiFi (IEEE 802.11) and Bluetooth wireless networks and the number will increase in the future as more phones, tablets, and laptops are equipped with these unlicensed spectrum wireles

  10. An Optical / Wireless Integrated Approach to provide Multiple Gateways in Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Raheel

    2012-03-01

    Full Text Available Wireless Mesh Network is an application technology different from the traditional peer-to-peer wireless bridge; it provides the multi-hop and multi-path connection to form a wireless environment of MESH framework so that the occurrence of single point failure can be prevented.WMNs are to provide high bandwidth broadband service to a large community of users through the use Internet Gateways which acts as a central point of internet attachment for the mesh routers, it is likely to be a potential bottleneck because of its limited wireless link capacity and security considerations of the Internet Gateways .By integrating Optical fiber network technologies with wireless mesh network we can achieve the Security and increase the capacity of the network, in this paper we define integration models with multiple gateways in the access network, which increases the capacity of wireless networks, increase security in network gateways, and decreases access point complexity through centralized management.

  11. Energy efficiency in hybrid mobile and wireless networks

    Energy Technology Data Exchange (ETDEWEB)

    Ziaul Haq Abbas

    2012-07-01

    . Towards this direction, various solutions have been proposed, ranging from deployment strategies for base stations to cooperative techniques etc. However, as base stations have the largest share in a network's energy consumption, methods that allow lightly-loaded base stations sleep or be switched off are possible means as a feasible step towards green communications. In this dissertation, we tackle the above mentioned problems from two perspectives, i.e., mobile station's and operator's perspectives. More specifically, by taking into account the amount of transferred data in uplinks and downlinks individually for various components in a hybrid network, strategies are proposed to reduce mobile station's battery energy consumption. For this purpose, other parameters such as link distance and remaining battery energy can also be considered for handover decision making, in order to maximize energy efficiency of the mobile station. To optimize long-term energy consumption of the mobile stations operated in such scenarios, a Markov decision process-based methodology is proposed as our contribution to this topic. Moreover, from operator's perspective, a network energy conservation scheme which may switch off a base station is proposed for micro- or pico-cells scenarios. Both deterministic and probabilistic schemes are proposed for network energy conservation. The problems considered and the solutions proposed in this dissertation advance the frontiers of the research work within the theme of energy efficiency for mobile devices as well as hybrid mobile and wireless networks.(Author)

  12. MotionCast for mobile wireless networks

    CERN Document Server

    Wang, Xinbing

    2013-01-01

    MotionCast for Mobile Wireless Networks provides an overview on the research for mobile ad-hoc networks regarding capacity and connectivity. Wireless ad-hoc networks are useful when there is a lack of infrastructure for communication. The proposed notion “MotionCast” is for the capacity analysis of multicast in MANET. A new kind of connectivity (k;m)-connectivity, is also defined, and its critical transmission range for i.i.d. (independently and identically distributed) and random walk mobility models are derived respectively. This book also investigates the related issues of connectivity in mobile and static circumstances. In addition, it provides a survey of the capacity scaling research, which gives a good summary of this field.

  13. Hack Recognition In Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    B. Srinivasulu

    2014-09-01

    Full Text Available A wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a ―cut‖. In this article we consider the problem of detecting cuts by the remaining nodes of a wireless sensor network. We propose an algorithm that allows like every node to detect when the connectivity to a specially designated node has been lost, and one or more nodes (that are connected to the special node after the cut to detect the occurrence of the cut. The algorithm is distributed and asynchronous: every node needs to communicate with only those nodes that are within its communication range. The algorithm is based on the iterative computation of a fictitious ―electrical potential‖ of the nodes. The convergence rate of the underlying iterative scheme is independent of the size and structure of the network.

  14. The physical layer security performance of wireless network based on Cooperation%利用协作技术实现无线通信物理层安全的方案

    Institute of Scientific and Technical Information of China (English)

    王大维; 付晓梅; 张立

    2011-01-01

    The physical layer security performance uses the fading and noise of wireless network, to make the main channel secure communication,according to secrecy singal equivocation of main channel larger than the equivocation of wiretap channel. Adopting Decode and Forward may help secure communication in main channel even wiretap channel is better than main channel. Recent research just focuses main channel secure when the relay decodes received data correctly,regardless of the relay channels secure. A dynamic cooperative strategy is designed to forward the received data or Cooperative Jamming signal to achieve the relay channels secure on the premise of secure communication in main channel. In addition,nested code and cooperative jamming secure are discussed.%物理层安全技术是利用无线信道的衰落和噪声,使合法接收者获得保密信息的疑义度大于窃听者得到的保密信息的疑义度,实现安全传输.利用中继解码转发协作技术可以在窃听信道好于合法信道条件时,帮助主信道实现安全传输.现有研究只是考虑了中继解码正确转发的主信道安全性,而忽略了中继信道的安全性.本文研究了中继解码正确和不正确两种情形,满足主信道安全传输前提下的中继信道的安全性能,提出一种中继动态地选择转发接收到的数据或是发送协作拥塞以实现物理层安全的方法,并探讨了利用巢状码和随机拥塞码的安全性能.

  15. Reliable Communication in Wireless Meshed Networks using Network Coding

    OpenAIRE

    Pahlevani, Peyman; Paramanathan, Achuthan; Hundebøll, Martin; Heide, Janus; Rein, Stephan Alexander; Fitzek, Frank

    2012-01-01

    The advantages of network coding have been extensively studied in the field of wireless networks. Integrating network coding with existing IEEE 802.11 MAC layer is a challenging problem. The IEEE 802.11 MAC does not provide any reliability mechanisms for overheard packets. This paper addresses this problem and suggests different mechanisms to support reliability as part of the MAC protocol. Analytical expressions to this problem are given to qualify the performanceof the modified network codi...

  16. Mobility Prediction in Wireless Ad Hoc Networks using Neural Networks

    CERN Document Server

    Kaaniche, Heni

    2010-01-01

    Mobility prediction allows estimating the stability of paths in a mobile wireless Ad Hoc networks. Identifying stable paths helps to improve routing by reducing the overhead and the number of connection interruptions. In this paper, we introduce a neural network based method for mobility prediction in Ad Hoc networks. This method consists of a multi-layer and recurrent neural network using back propagation through time algorithm for training.

  17. The SafeCOP ECSEL Project: Safe Cooperating Cyber-Physical Systems Using Wireless Communication

    DEFF Research Database (Denmark)

    Pop, Paul; Scholle, Detlef; Hansson, Hans

    2016-01-01

    This paper presents an overview of the ECSEL project entitled "Safe Cooperating Cyber-Physical Systems using Wireless Communication" (SafeCOP), which runs during the period 2016 -- 2019. SafeCOP targets safety-related Cooperating Cyber-Physical Systems (CO-CPS) characterised by use of wireless...

  18. Wireless Sensor Network Handles Image Data

    Science.gov (United States)

    2008-01-01

    To relay data from remote locations for NASA s Earth sciences research, Goddard Space Flight Center contributed to the development of "microservers" (wireless sensor network nodes), which are now used commercially as a quick and affordable means to capture and distribute geographical information, including rich sets of aerial and street-level imagery. NASA began this work out of a necessity for real-time recovery of remote sensor data. These microservers work much like a wireless office network, relaying information between devices. The key difference, however, is that instead of linking workstations within one office, the interconnected microservers operate miles away from one another. This attribute traces back to the technology s original use: The microservers were originally designed for seismology on remote glaciers and ice streams in Alaska, Greenland, and Antarctica-acquiring, storing, and relaying data wirelessly between ground sensors. The microservers boast three key attributes. First, a researcher in the field can establish a "managed network" of microservers and rapidly see the data streams (recovered wirelessly) on a field computer. This rapid feedback permits the researcher to reconfigure the network for different purposes over the course of a field campaign. Second, through careful power management, the microservers can dwell unsupervised in the field for up to 2 years, collecting tremendous amounts of data at a research location. The third attribute is the exciting potential to deploy a microserver network that works in synchrony with robotic explorers (e.g., providing ground truth validation for satellites, supporting rovers as they traverse the local environment). Managed networks of remote microservers that relay data unsupervised for up to 2 years can drastically reduce the costs of field instrumentation and data rec

  19. Cooperative epidemics on multiplex networks

    CERN Document Server

    Azimi-Tafreshi, N

    2015-01-01

    The spread of one disease, in some cases, can stimulate the spreading of another infectious disease. Here, we treat analytically a symmetric co-infection model for spreading of two diseases on a 2-layer multiplex network. We allow layer overlapping, but we assume that each layer is random and locally loop-less. Infection with one of the diseases increases the probability to get infected by the other. Using generating function method, we calculate exactly the fraction of individuals infected with both diseases (so-called co-infected clusters) in the stationary state, as well as the epidemic spreading thresholds and the phase diagram of the model. With increasing cooperation, we observe a tricritical point and the type of transition changes from continuous to hybrid. Finally we compare the co-infected clusters in the case of co-operating diseases with the so-called viable clusters in networks with dependencies.

  20. Analyzing Multimode Wireless Sensor Networks Using the Network Calculus

    Directory of Open Access Journals (Sweden)

    Xi Jin

    2015-01-01

    Full Text Available The network calculus is a powerful tool to analyze the performance of wireless sensor networks. But the original network calculus can only model the single-mode wireless sensor network. In this paper, we combine the original network calculus with the multimode model to analyze the maximum delay bound of the flow of interest in the multimode wireless sensor network. There are two combined methods A-MM and N-MM. The method A-MM models the whole network as a multimode component, and the method N-MM models each node as a multimode component. We prove that the maximum delay bound computed by the method A-MM is tighter than or equal to that computed by the method N-MM. Experiments show that our proposed methods can significantly decrease the analytical delay bound comparing with the separate flow analysis method. For the large-scale wireless sensor network with 32 thousands of sensor nodes, our proposed methods can decrease about 70% of the analytical delay bound.

  1. Power Optimization Techniques for Next Generation Wireless Networks

    Directory of Open Access Journals (Sweden)

    Ratheesh R

    2016-02-01

    Full Text Available The massive data traffic and the need for high speed wireless communication is increasing day by day corresponds to an exponential increase in the consumption of power by Information and Communication Technology (ICT sector. Reducing consumption of power in wireless network is a challenging topic and has attracted the attention of researches around the globe. Many techniques like multiple-input multiple-output (MIMO, cognitive radio, cooperative heterogeneous communications and new network strategies such as heterogeneous networks, scattered antennas, multi-hop communication, etc., as well as radio and resource managing techniques like various sleep mode algorithms, cross layer optimization etc., have been proposed as solutions for this problem. In this paper, we present an overview of some of these techniques to optimize power in cellular network and MANET from various literatures. The green energy approaches as an alternate to grid power to optimize power consumption of BS is also reviewed. We also proposed a methodology to optimize power consumption in LTE-A network by jointly deploying RSs at cell edges.

  2. 47 CFR 90.1405 - Shared wireless broadband network.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Shared wireless broadband network. 90.1405... broadband network. The Shared Wireless Broadband Network developed by the 700 MHz Public/Private Partnership must be designed to meet requirements associated with a nationwide, public safety broadband network....

  3. Scalable Video Streaming in Wireless Mesh Networks for Education

    Science.gov (United States)

    Liu, Yan; Wang, Xinheng; Zhao, Liqiang

    2011-01-01

    In this paper, a video streaming system for education based on a wireless mesh network is proposed. A wireless mesh network is a self-organizing, self-managing and reliable intelligent network, which allows educators to deploy a network quickly. Video streaming plays an important role in this system for multimedia data transmission. This new…

  4. Scalable Video Streaming in Wireless Mesh Networks for Education

    Science.gov (United States)

    Liu, Yan; Wang, Xinheng; Zhao, Liqiang

    2011-01-01

    In this paper, a video streaming system for education based on a wireless mesh network is proposed. A wireless mesh network is a self-organizing, self-managing and reliable intelligent network, which allows educators to deploy a network quickly. Video streaming plays an important role in this system for multimedia data transmission. This new…

  5. The use of Wireless Sensor Network for increasing airport security

    Directory of Open Access Journals (Sweden)

    Jakub Kraus

    2013-11-01

    Full Text Available This article focuses on the use of wireless sensor networks for airport security, respectively using sensor networks as a replacement or add-on to existing security measures. The article describes the sensor network and its possible application to various airport objects and financial analysis of the perimeter security with wireless sensor network.

  6. Power distribution and performance analysis for wireless communication networks

    CERN Document Server

    Zhao, Dongmei

    2012-01-01

    This book provides an analysis of transmission power and network performance in different wireless communication networks. It presents the latest research and techniques for power and interference control and performance modeling in wireless communication networks with different network topologies, air interfaces, and transmission techniques. While studying the power distributions and resource management, the reader will also learn basic methodology and skills for problem formulations, can ascertain the complexity for designing radio resource management strategies in modern wireless communicat

  7. Wireless Network Coding with Local Network Views: Coded Layer Scheduling

    CERN Document Server

    Vahid, Alireza; Avestimehr, A Salman; Sabharwal, Ashutosh

    2011-01-01

    One of the fundamental challenges in the design of distributed wireless networks is the large dynamic range of network state. Since continuous tracking of global network state at all nodes is practically impossible, nodes can only acquire limited local views of the whole network to design their transmission strategies. In this paper, we study multi-layer wireless networks and assume that each node has only a limited knowledge, namely 1-local view, where each S-D pair has enough information to perform optimally when other pairs do not interfere, along with connectivity information for rest of the network. We investigate the information-theoretic limits of communication with such limited knowledge at the nodes. We develop a novel transmission strategy, namely Coded Layer Scheduling, that solely relies on 1-local view at the nodes and incorporates three different techniques: (1) per layer interference avoidance, (2) repetition coding to allow overhearing of the interference, and (3) network coding to allow inter...

  8. Intelligent wireless forensic model (IWFM) for moving devices between wireless networks

    CSIR Research Space (South Africa)

    Ngobeni, SJ

    2008-09-01

    Full Text Available for prosecution of the wireless perpetrators. The essence of this study is to develop an Intelligent Wireless Forensic Model (IWFM) for acquiring data for forensic purposes in the event that a device has moved from one wireless network to another...

  9. Bridge monitoring using heterogeneous wireless sensor network

    Science.gov (United States)

    Haran, Shivan; Kher, Shubhalaxmi; Mehndiratta, Vandana

    2010-03-01

    Wireless sensor networks (WSN) are proving to be a good fit where real time monitoring of multiple physical parameters is required. In many applications such as structural health monitoring, patient data monitoring, traffic accident monitoring and analysis, sensor networks may involve interface with conventional P2P systems and it is challenging to handle heterogeneous network systems. Heterogeneous deployments will become increasingly prevalent as it allows for systems to seamlessly integrate and interoperate especially when it comes to applications involving monitoring of large infrastructures. Such networks may have wireless sensor network overlaid on a conventional computer network to pick up data from one distant location and carry out the analysis after relaying it over to another distant location. This paper discusses monitoring of bridges using WSN. As a test bed, a heterogeneous network of WSN and conventional P2P together with a combination of sensing devices (including vibration and strain) is to be used on a bridge model. Issues related to condition assessment of the bridge for situations including faults, overloads, etc., as well as analysis of network and system performance will be discussed. When conducted under controlled conditions, this is an important step towards fine tuning the monitoring system for recommendation of permanent mounting of sensors and collecting data that can help in the development of new methods for inspection and evaluation of bridges. The proposed model, design, and issues therein will be discussed, along with its implementation and results.

  10. Coverage and Exposure Paths in Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    Liu-Sheng Huang; Hong-Li Xu; Yang Wang; Jun-Min Wu; Hong Li

    2006-01-01

    Wireless sensor networks have posed a number of challenging problems such as localization, deployment and tracking, etc. One of the interesting problems is the calculation of the coverage and exposure paths for the sensor networks.This paper presents a fully localized algorithm to solve the worst coverage problem first introduced by Meguerdichian et al.The nodes of the sensor network cooperate to construct the worst coverage path only by the one-hop neighbor's information,thus avoiding the massive communication and conserving the energy. The correctness of the proposed algorithm is proved formally under the sensing diminishing model. Moreover, this algorithm can be easily extended to solve the minimal exposure problem with local information as well.

  11. Key Management in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  12. Cooperative object tracking and composite event detection with wireless embedded smart cameras.

    Science.gov (United States)

    Wang, Youlu; Velipasalar, Senem; Casares, Mauricio

    2010-10-01

    Embedded smart cameras have limited processing power, memory, energy, and bandwidth. Thus, many system- and algorithm-wise challenges remain to be addressed to have operational, battery-powered wireless smart-camera networks. We present a wireless embedded smart-camera system for cooperative object tracking and detection of composite events spanning multiple camera views. Each camera is a CITRIC mote consisting of a camera board and wireless mote. Lightweight and robust foreground detection and tracking algorithms are implemented on the camera boards. Cameras exchange small-sized data wirelessly in a peer-to-peer manner. Instead of transferring or saving every frame or trajectory, events of interest are detected. Simpler events are combined in a time sequence to define semantically higher-level events. Event complexity can be increased by increasing the number of primitives and/or number of camera views they span. Examples of consistently tracking objects across different cameras, updating location of occluded/lost objects from other cameras, and detecting composite events spanning two or three camera views, are presented. All the processing is performed on camera boards. Operating current plots of smart cameras, obtained when performing different tasks, are also presented. Power consumption is analyzed based upon these measurements.

  13. Coal mine gas monitoring system based on wireless sensor network

    Institute of Scientific and Technical Information of China (English)

    WANG Jian; WANG Ru-lin; WANG Xue-min; SHEN Chuan-he

    2007-01-01

    Based on the nowadays'condition.it is urgent that the gas detection cable communication system must be replaced by the wireless communication systems.The wireless sensors distributed in the environment can achieve the intelligent gas monitoring system.Apply with multilayer data fuse to design working tactics,and import the artificial neural networks to analyze detecting result.The wireless sensors system communicates with the controI center through the optical fiber cable.All the gas sensor nodes distributed in coal mine are combined into an intelligent,flexible structure wireless network system.forming coal mine gas monitoring system based on wireless sensor network.

  14. Wireless Communication Networks' Planning in Underdeveloped Countries%Wireless Communication Networks' Planning in Underdeveloped Countries

    Institute of Scientific and Technical Information of China (English)

    XU Rui

    2012-01-01

    The planning of wireless communication networks in underdeveloped countries is studied for landline telephone, fixed broadband wireless access and PLMN systems via investigation and discussion of the LDC networks' characteristic, technology selection, deployment consideration, network configuring, civil work evaluation and investment estimation. An example is embedded all through providing a general

  15. Performance Evaluation of Dynamic and Static Sensor Node in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Payal T Mahida

    2013-02-01

    Full Text Available A wireless sensor network (WSN consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. The main goal of this paper is to analysis and Evaluation of AODV routing protocol for wireless sensor network and compares the Static and Dynamic Scenarios for PDR, e2e Delay and throughput. The goal of this work is to perform a simulation with different metrics, analysis of the results and deriving a conclusion on basis of performance evaluation.

  16. COGRADNET: UBIQUITOUS HETEROGENEOUS WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    MOHD HASBULLAH OMAR

    2009-06-01

    Full Text Available Mobile radio systems have shown rapid growth and hence increase the awareness for more efficient use of spectrum. With the advancements of technology, the development of radio systems that is dynamic and efficient in terms of spectrum usage can be realized. Cognitive radio system is one of the advancement that enhanced the adaptive capabilities of the systems that make the usage of spectrum more efficient, versatile and flexible. It also able to adapt their operations based on its internal and external factors by sensing its environment. The cognitive radio systems may be a solution for the spectrum scarcity faced by developer to tackle the issue of signal propagation and bigger coverage for broadband internet access. This paper will addressed the cognitive radio technology for ubiquitous broadband wireless internet access.

  17. Wireless sensor networks in a maritime environment

    Science.gov (United States)

    Kavelaars, W.; Maris, M.

    2005-10-01

    In the recent years, there has been a lot of research on sensor networks and their applications. In particular for monitoring large and potentially hostile areas these networks have proven to be very useful. The technique of land-based sensor networks can be extrapolated to sensing buoys at sea or in harbors. This is a novel and intriguing addition to existing maritime monitoring systems. At TNO, much research effort has gone into developing sensor networks. In this paper, the TNOdes sensor network is presented. Its practical employability is demonstrated in a surveillance application deploying 50 nodes. The system is capable of tracking persons in a field, as would be the situation around a military compound. A camera-system is triggered by the sensors and zooms into the detected moving objects. It is described how this system could be modified to create a wireless buoys network. Typical applications of a wireless (and potentially mobile) buoy network are bay-area surveillance, mine detection, identification and ship protection.

  18. Caching Eliminates the Wireless Bottleneck in Video Aware Wireless Networks

    Directory of Open Access Journals (Sweden)

    Andreas F. Molisch

    2014-01-01

    Full Text Available Wireless video is the main driver for rapid growth in cellular data traffic. Traditional methods for network capacity increase are very costly and do not exploit the unique features of video, especially asynchronous content reuse. In this paper we give an overview of our work that proposed and detailed a new transmission paradigm exploiting content reuse and the widespread availability of low-cost storage. Our network structure uses caching in helper stations (femtocaching and/or devices, combined with highly spectrally efficient short-range communications to deliver video files. For femtocaching, we develop optimum storage schemes and dynamic streaming policies that optimize video quality. For caching on devices, combined with device-to-device (D2D communications, we show that communications within clusters of mobile stations should be used; the cluster size can be adjusted to optimize the tradeoff between frequency reuse and the probability that a device finds a desired file cached by another device in the same cluster. In many situations the network throughput increases linearly with the number of users, and the tradeoff between throughput and outage is better than in traditional base-station centric systems. Simulation results with realistic numbers of users and channel conditions show that network throughput can be increased by two orders of magnitude compared to conventional schemes.

  19. SITRUS: Semantic Infrastructure for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kalil A. Bispo

    2015-10-01

    Full Text Available Wireless sensor networks (WSNs are made up of nodes with limited resources, such as processing, bandwidth, memory and, most importantly, energy. For this reason, it is essential that WSNs always work to reduce the power consumption as much as possible in order to maximize its lifetime. In this context, this paper presents SITRUS (semantic infrastructure for wireless sensor networks, which aims to reduce the power consumption of WSN nodes using ontologies. SITRUS consists of two major parts: a message-oriented middleware responsible for both an oriented message communication service and a reconfiguration service; and a semantic information processing module whose purpose is to generate a semantic database that provides the basis to decide whether a WSN node needs to be reconfigurated or not. In order to evaluate the proposed solution, we carried out an experimental evaluation to assess the power consumption and memory usage of WSN applications built atop SITRUS.

  20. Fundamental Tradeoffs on Green Wireless Networks

    CERN Document Server

    Chen, Yan; Xu, Shugong; Li, Geoffrey Ye

    2011-01-01

    Traditional design of mobile wireless networks mainly focuses on ubiquitous access and large capacity. However, as energy saving and environmental protection become a global demand and inevitable trend, wireless researchers and engineers need to shift their focus to energy-efficiency oriented design, that is, green radio. In this paper, we propose a framework for green radio research and integrate the fundamental issues that are currently scattered. The skeleton of the framework consists of four fundamental tradeoffs: deployment efficiency - energy efficiency tradeoff, spectrum efficiency - energy efficiency tradeoff, bandwidth - power tradeoff, and delay - power tradeoff. With the help of the four fundamental tradeoffs, we demonstrate that key network performance/cost indicators are all stringed together.

  1. Application of Wireless Sensor Networks to Automobiles

    Science.gov (United States)

    Tavares, Jorge; Velez, Fernando J.; Ferro, João M.

    2008-01-01

    Some applications of Wireless Sensor Networks (WSNs) to the automobile are identified, and the use of Crossbow MICAz motes operating at 2.4 GHz is considered together with TinyOS support. These WSNs are conceived in order to measure, process and supply to the user diverse types of information during an automobile journey. Examples are acceleration and fuel consumption, identification of incorrect tire pressure, verification of illumination, and evaluation of the vital signals of the driver. A brief survey on WSNs concepts is presented, as well as the way the wireless sensor network itself was developed. Calibration curves were produced which allowed for obtaining luminous intensity and temperature values in the appropriate units. Aspects of the definition of the architecture and the choice/implementation of the protocols are identified. Security aspects are also addressed.

  2. Secure Communication in Stochastic Wireless Networks

    CERN Document Server

    Pinto, Pedro C; Win, Moe Z

    2010-01-01

    Information-theoretic security -- widely accepted as the strictest notion of security -- relies on channel coding techniques that exploit the inherent randomness of the propagation channels to significantly strengthen the security of digital communications systems. Motivated by recent developments in the field, this paper aims at a characterization of the fundamental secrecy limits of wireless networks. Based on a general model in which legitimate nodes and potential eavesdroppers are randomly scattered in space, the intrinsically secure communications graph (iS-graph) is defined from the point of view of information-theoretic security. Conclusive results are provided for the local connectivity of the Poisson iS-graph, in terms of node degrees and isolation probabilities. It is shown how the secure connectivity of the network varies with the wireless propagation effects, the secrecy rate threshold of each link, and the noise powers of legitimate nodes and eavesdroppers. Sectorized transmission and eavesdroppe...

  3. Localization in Wireless Networks Foundations and Applications

    CERN Document Server

    Sanford, Jessica Feng; Slijepcevic, Sasha

    2012-01-01

    In a computational tour-de-force, this volume wipes away a host of problems related to location discovery in wireless ad-hoc sensor networks. WASNs have recognized potential in many applications that are location-dependent, yet are heavily constrained by factors such as cost and energy consumption. Their “ad-hoc” nature, with direct rather than mediated connections between a network of wireless devices, adds another layer of difficulty.   Basing this work entirely on data-driven, coordinated algorithms, the authors' aim is to present location discovery techniques that are highly accurate—and which fit user criteria. The research deploys nonparametric statistical methods and relies on the concept of joint probability to construct error (including location error) models and environmental field models. It also addresses system issues such as the broadcast and scheduling of the beacon. Reporting an impressive accuracy gain of almost 17 percent, and organized in a clear, sequential manner, this book represe...

  4. SITRUS: Semantic Infrastructure for Wireless Sensor Networks.

    Science.gov (United States)

    Bispo, Kalil A; Rosa, Nelson S; Cunha, Paulo R F

    2015-10-29

    Wireless sensor networks (WSNs) are made up of nodes with limited resources, such as processing, bandwidth, memory and, most importantly, energy. For this reason, it is essential that WSNs always work to reduce the power consumption as much as possible in order to maximize its lifetime. In this context, this paper presents SITRUS (semantic infrastructure for wireless sensor networks), which aims to reduce the power consumption of WSN nodes using ontologies. SITRUS consists of two major parts: a message-oriented middleware responsible for both an oriented message communication service and a reconfiguration service; and a semantic information processing module whose purpose is to generate a semantic database that provides the basis to decide whether a WSN node needs to be reconfigurated or not. In order to evaluate the proposed solution, we carried out an experimental evaluation to assess the power consumption and memory usage of WSN applications built atop SITRUS.

  5. Applying Physical-Layer Network Coding in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Liew SoungChang

    2010-01-01

    Full Text Available A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes, simultaneously. Rather than a blessing, this feature is treated more as an interference-inducing nuisance in most wireless networks today (e.g., IEEE 802.11. This paper shows that the concept of network coding can be applied at the physical layer to turn the broadcast property into a capacity-boosting advantage in wireless ad hoc networks. Specifically, we propose a physical-layer network coding (PNC scheme to coordinate transmissions among nodes. In contrast to "straightforward" network coding which performs coding arithmetic on digital bit streams after they have been received, PNC makes use of the additive nature of simultaneously arriving electromagnetic (EM waves for equivalent coding operation. And in doing so, PNC can potentially achieve 100% and 50% throughput increases compared with traditional transmission and straightforward network coding, respectively, in 1D regular linear networks with multiple random flows. The throughput improvements are even larger in 2D regular networks: 200% and 100%, respectively.

  6. Achieving fairness by aggregate power allocation in opportunistic cooperation networks

    Institute of Scientific and Technical Information of China (English)

    Cao Jianfei; Zhong Zhangdui; Ai Bo

    2009-01-01

    Within a wireless opportunistic network, one of the lucky users gets an opportunity to utilize the whole radio resource. However some of the unlucky users keep silent during an unexpected period resulting from severe wireless environment and imperfect scheduling algorithms. An opportunistic cooperation protocol is proposed that can achieve equivalent performance measured in terms of outage probability, in which scheme the opportunistic user helps to relay what need retransmitting indicated by the destination and selects the appropriate power allocation to pursue fairness. The proposed scheme deploys superposition coding and successive interference cancellation at relay and destination, respectively. To improve the spectral efficiency, the modified cooperation architecture involves two opportunistic users which work in turn. The simulation results demonstrate that the protocol obtains better performance compared with the conventional methods.

  7. Frameless ALOHA Protocol for Wireless Networks

    DEFF Research Database (Denmark)

    Stefanovic, Cedomir; Popovski, Petar; Vukobratovic, Dejan

    2012-01-01

    We propose a novel distributed random access scheme for wireless networks based on slotted ALOHA, motivated by the analogies between successive interference cancellation and iterative belief-propagation decoding on erasure channels. The proposed scheme assumes that each user independently accesse...... process. Our aim is to optimize the slot access probability in order to achieve rateless-like distributions, focusing both on the maximization of the resolution probability of user transmissions and the throughput of the scheme....

  8. Fundamentals of Wireless Networks: Connectivity and Capacity

    Science.gov (United States)

    2010-06-09

    awake every k-th clock cycle. A more detailed explanation of wake-node bands and their variation with parameters is given in the next section. Inspection...which both decoders can decode both messages. The considered channel becomes a compound multiaccess ( MAC ) channel consisting of two MAC channels, one to...organization and energy efficient tdma mac protocol by wake up for wireless sensor networks. In Proceedings of IEEE SECON ’04, pages 335–341, 2004. [9] M. H

  9. Location Privacy Issues in Wireless Sensor Networks

    Science.gov (United States)

    Kůr, Jiří; Stetsko, Andriy

    We discuss location privacy issues in wireless sensor networks. We consider sensor nodes with more responsible roles and the need to protect locations of such nodes. Available countermeasures against various types of traffic analysis attacks are examined and their problems are identified. We do not propose new traffic analysis resistance technique. Instead, we draw attention to blanks in current situation and identify several open questions, which should be answered in order to ensure location privacy of nodes.

  10. Cross Layer Interference Management in Wireless Biomedical Networks

    Directory of Open Access Journals (Sweden)

    Emmanouil G. Spanakis

    2014-04-01

    Full Text Available Interference, in wireless networks, is a central phenomenon when multiple uncoordinated links share a common communication medium. The study of the interference channel was initiated by Shannon in 1961 and since then this problem has been thoroughly elaborated at the Information theoretic level but its characterization still remains an open issue. When multiple uncoordinated links share a common medium the effect of interference is a crucial limiting factor for network performance. In this work, using cross layer cooperative communication techniques, we study how to compensate interference in the context of wireless biomedical networks, where many links transferring biomedical or other health related data may be formed and suffer from all other interfering transmissions, to allow successful receptions and improve the overall network performance. We define the interference limited communication range to be the critical communication region around a receiver, with a number of surrounding interfering nodes, within which a successful communication link can be formed. Our results indicate that we can achieve more successful transmissions by adapting the transmission rate and power, to the path loss exponent, and the selected mode of the underline communication technique allowing interference mitigation and when possible lower power consumption and increase achievable transmission rates.

  11. Experiment of Wireless Sensor Network to Monitor Field Data

    Directory of Open Access Journals (Sweden)

    Kwang Sik Kim

    2009-08-01

    Full Text Available Recently the mobile wireless network has been drastically enhanced and one of the most efficient ways to realize the ubiquitous network will be to develop the converged network by integrating the mobile wireless network with other IP fixed network like NGN (Next Generation Network. So in this paper the term of the wireless ubiquitous network is used to describe this approach. In this paper, first, the wireless ubiquitous network architecture is described based on IMS which has been standardized by 3GPP (3rd Generation Partnership Program. Next, the field data collection system to match the satellite data using location information is proposed based on the concept of the wireless ubiquitous network architecture. The purpose of the proposed system is to provide more accurate analyzing method with the researchers in the remote sensing area.

  12. Key handling in wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Li, Y; Newe, T [Optical Fibre Sensors Research Centre, Department of Electronic and Computer Engineering, University of Limerick, Limerick (Ireland)

    2007-07-15

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  13. Simultaneity Analysis In A Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Malović Miodrag

    2015-06-01

    Full Text Available An original wireless sensor network for vibration measurements was designed. Its primary purpose is modal analysis of vibrations of large structures. A number of experiments have been performed to evaluate the system, with special emphasis on the influence of different effects on simultaneity of data acquired from remote nodes, which is essential for modal analysis. One of the issues is that quartz crystal oscillators, which provide time reading on the devices, are optimized for use in the room temperature and exhibit significant frequency variations if operated outside the 20–30°C range. Although much research was performed to optimize algorithms of synchronization in wireless networks, the subject of temperature fluctuations was not investigated and discussed in proportion to its significance. This paper describes methods used to evaluate data simultaneity and some algorithms suitable for its improvement in small to intermediate size ad-hoc wireless sensor networks exposed to varying temperatures often present in on-site civil engineering measurements.

  14. Wireless Sensor Network for Wearable Physiological Monitoring

    Directory of Open Access Journals (Sweden)

    P. S. Pandian

    2008-05-01

    Full Text Available Wearable physiological monitoring system consists of an array of sensors embedded into the fabric of the wearer to continuously monitor the physiological parameters and transmit wireless to a remote monitoring station. At the remote monitoring station the data is correlated to study the overall health status of the wearer. In the conventional wearable physiological monitoring system, the sensors are integrated at specific locations on the vest and are interconnected to the wearable data acquisition hardware by wires woven into the fabric. The drawbacks associated with these systems are the cables woven in the fabric pickup noise such as power line interference and signals from nearby radiating sources and thereby corrupting the physiological signals. Also repositioning the sensors in the fabric is difficult once integrated. The problems can be overcome by the use of physiological sensors with miniaturized electronics to condition, process, digitize and wireless transmission integrated into the single module. These sensors are strategically placed at various locations on the vest. Number of sensors integrated into the fabric form a network (Personal Area Network and interacts with the human system to acquire and transmit the physiological data to a wearable data acquisition system. The wearable data acquisition hardware collects the data from various sensors and transmits the processed data to the remote monitoring station. The paper discusses wireless sensor network and its application to wearable physiological monitoring and its applications. Also the problems associated with conventional wearable physiological monitoring are discussed.

  15. Fiber-wireless convergence in next-generation communication networks systems, architectures, and management

    CERN Document Server

    Chang, Gee-Kung; Ellinas, Georgios

    2017-01-01

    This book investigates new enabling technologies for Fi-Wi convergence. The editors discuss Fi-Wi technologies at the three major network levels involved in the path towards convergence: system level, network architecture level, and network management level. The main topics will be: a. At system level: Radio over Fiber (digitalized vs. analogic, standardization, E-band and beyond) and 5G wireless technologies; b. Network architecture level: NGPON, WDM-PON, BBU Hotelling, Cloud Radio Access Networks (C-RANs), HetNets. c. Network management level: SDN for convergence, Next-generation Point-of-Presence, Wi-Fi LTE Handover, Cooperative MultiPoint. • Addresses the Fi-Wi convergence issues at three different levels, namely at the system level, network architecture level, and network management level • Provides approaches in communication systems, network architecture, and management that are expected to steer the evolution towards fiber-wireless convergence • Contributions from leading experts in the field of...

  16. Network Management Framework for Wireless Sensor Networks

    Science.gov (United States)

    Kim, Jaewoo; Jeon, Hahnearl; Lee, Jaiyong

    Network Management is the process of managing, monitoring, and controlling the network. Conventional network management was based on wired network which is heavy and unsuitable for resource constrained WSNs. WSNs can have large scale network and it is impossible to manage each node individually. Also, polling mechanism of Simple Network Management Protocol (SNMP) impose heavy management traffic overhead. Since management messages consume resources of WSNs, it can affect the performance of the network. Therefore, it is necessary for WSNs to perform energy efficient network management. In this paper, we will propose network management framework. We will introduce cluster-based network management architecture, and classify the Management Information Base (MIB) according to their characteristics. Then, we will define management messages and message exchange operation for each kind of MIB. The analysis result of the management overhead indicates that the proposed framework can reduce management traffic compared to polling mechanism.

  17. Industrial wireless sensor networks applications, protocols, and standards

    CERN Document Server

    Güngör, V Çagri

    2013-01-01

    The collaborative nature of industrial wireless sensor networks (IWSNs) brings several advantages over traditional wired industrial monitoring and control systems, including self-organization, rapid deployment, flexibility, and inherent intelligent processing. In this regard, IWSNs play a vital role in creating more reliable, efficient, and productive industrial systems, thus improving companies' competitiveness in the marketplace. Industrial Wireless Sensor Networks: Applications, Protocols, and Standards examines the current state of the art in industrial wireless sensor networks and outline

  18. Multihop Routing In Self-Organizing Wireless Sensor Networks

    OpenAIRE

    Rajashree V. Biradar; Sawant, S. R.; R. R. Mudholkar; V. C. Patil

    2011-01-01

    Wireless sensor networks have emerged in the past decade as a result of recent advances in microelectronic system fabrication, wireless communications, integrated circuit technologies, microprocessor hardware and nano-technology, progress in ad-hoc networking routing protocols, distributed signal processing, pervasive computing and embedded systems. As routing protocols are application specific, recent advances in wireless sensor networks have led to many new protocols specifically designed f...

  19. Synchronized Data Aggregation for Wireless Sensor Network

    DEFF Research Database (Denmark)

    Dnyaneshwar, Mantri; Prasad, Neeli R.; Prasad, Ramjee

    2014-01-01

    Wireless Sensor Networks (WSNs) are used for monitoring and data collection purposes. A key challenge in effective data collection is to schedule and synchronize the activities of the nodes with global clock. This paper proposes the Synchronized Data Aggregation Algorithm (SDA) using spanning tree...... mechanism. It provides network-wide time synchronization for sensor network. In the initial stage algorithm established the hierarchical structure in the network and then perform the pair - wise synchronization. SDA aggregate data with a global time scale throughout the network. The aggregated packets...... are scheduled using TDMA as the MAC layer protocol. Simulation results show that, SDA gives promising result of energy efficiency and delay as compared with state-of-the-art solutions....

  20. Interference Mitigation in Large Random Wireless Networks

    CERN Document Server

    Aldridge, Matthew

    2011-01-01

    A central problem in the operation of large wireless networks is how to deal with interference -- the unwanted signals being sent by transmitters that a receiver is not interested in. This thesis looks at ways of combating such interference. In Chapters 1 and 2, we outline the necessary information and communication theory background, including the concept of capacity. We also include an overview of a new set of schemes for dealing with interference known as interference alignment, paying special attention to a channel-state-based strategy called ergodic interference alignment. In Chapter 3, we consider the operation of large regular and random networks by treating interference as background noise. We consider the local performance of a single node, and the global performance of a very large network. In Chapter 4, we use ergodic interference alignment to derive the asymptotic sum-capacity of large random dense networks. These networks are derived from a physical model of node placement where signal strength d...

  1. A Survey on Wireless Sensor Network Security

    CERN Document Server

    Sen, Jaydip

    2010-01-01

    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.

  2. Dynamic Packet Scheduling in Wireless Networks

    CERN Document Server

    Kesselheim, Thomas

    2012-01-01

    We consider protocols that serve communication requests arising over time in a wireless network that is subject to interference. Unlike previous approaches, we take the geometry of the network and power control into account, both allowing to increase the network's performance significantly. We introduce a stochastic and an adversarial model to bound the packet injection. Although taken as the primary motivation, this approach is not only suitable for models based on the signal-to-interference-plus-noise ratio (SINR). It also covers virtually all other common interference models, for example the multiple-access channel, the radio-network model, the protocol model, and distance-2 matching. Packet-routing networks allowing each edge or each node to transmit or receive one packet at a time can be modeled as well. Starting from algorithms for the respective scheduling problem with static transmission requests, we build distributed stable protocols. This is more involved than in previous, similar approaches because...

  3. Wireless body sensor networks for health-monitoring applications.

    Science.gov (United States)

    Hao, Yang; Foster, Robert

    2008-11-01

    Current wireless technologies, such as wireless body area networks and wireless personal area networks, provide promising applications in medical monitoring systems to measure specified physiological data and also provide location-based information, if required. With the increasing sophistication of wearable and implantable medical devices and their integration with wireless sensors, an ever-expanding range of therapeutic and diagnostic applications is being pursued by research and commercial organizations. This paper aims to provide a comprehensive review of recent developments in wireless sensor technology for monitoring behaviour related to human physiological responses. It presents background information on the use of wireless technology and sensors to develop a wireless physiological measurement system. A generic miniature platform and other available technologies for wireless sensors have been studied in terms of hardware and software structural requirements for a low-cost, low-power, non-invasive and unobtrusive system.

  4. Security in wireless sensor networks

    CERN Document Server

    Oreku, George S

    2016-01-01

    This monograph covers different aspects of sensor network security including new emerging technologies. The authors present a mathematical approach to the topic and give numerous practical examples as well as case studies to illustrate the theory. The target audience primarily comprises experts and practitioners in the field of sensor network security, but the book may also be beneficial for researchers in academia as well as for graduate students.

  5. Comparison of routing metrics for wireless mesh networks

    CSIR Research Space (South Africa)

    Nxumalo, SL

    2011-09-01

    Full Text Available A number of routing metrics exist in wireless networks. These routing metrics were originally designed for mobile ad hoc networks (MANETs). When Wireless Mesh Networks (WMNs) came into being, an idea of introducing and using these routing metrics...

  6. Simple, Reliable, Scalable and Energy Efficient Wireless Sensor Networks

    NARCIS (Netherlands)

    Guo, C.

    2010-01-01

    Wireless communication and networking technology has facilitated people to be connected with each other closely. Cellular network is evolving now from the third generation to the fourth generation. In the meanwhile we are experiencing the demand for wireless networks which can facilitate the communi

  7. The Systems Librarian: Implementing Wireless Networks without Compromising Security

    Science.gov (United States)

    Breeding, Marshall

    2005-01-01

    Many libraries are or soon will be offering Wi-Fi, also known as wireless networks. The largest perceived barriers to providing this service are concerns about security. The prime rule when deploying Wi-Fi is segregation, having a clear separation between a public wireless network and the rest of the library?s network. A number of devices can be…

  8. An Improved Wireless Sensor Network Routing Algorithm

    Institute of Scientific and Technical Information of China (English)

    Shengmei Luo; Xue Li; Yiai Jin; Zhixin Sun

    2015-01-01

    High performance with low power consumption is an essential factor in wireless sensor networks (WSN). In order to address the issue on the lifetime and the consumption of nodes in WSNs, an improved ad hoc on⁃demand distance vector rout⁃ing (IAODV) algorithm is proposed based on AODV and LAR protocols. This algorithm is a modified on⁃demand routing al⁃gorithm that limits data forwarding in the searching domain, and then chooses the route on basis of hop count and power consumption. The simulation results show that the algorithm can effectively reduce power consumption as well as prolong the network lifetime.

  9. Survey of propagation Model in wireless Network

    Directory of Open Access Journals (Sweden)

    Hemant Kumar Sharma

    2011-05-01

    Full Text Available To implementation of mobile ad hoc network wave propagation models are necessary to determine propagation characteristic through a medium. Wireless mobile ad hoc networks are self creating and self organizing entity. Propagation study provides an estimation of signal characteristics. Accurate prediction of radio propagation behaviour for MANET is becoming a difficult task. This paper presents investigation of propagation model. Radio wave propagation mechanisms are absorption, reflection, refraction, diffraction and scattering. This paper discuss free space model, two rays model, and cost 231 hata and its variants and fading model, and summarized the advantages and disadvantages of these model. This study would be helpful in choosing the correct propagation model.

  10. SECURE AND AUTHENTICATED SOURCE ROUTING IN WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    Mukesh Singla

    2012-09-01

    Full Text Available Wireless networking is today’s glamour technology. Wecan hardly pick up a technology publication withoutencountering articles extolling its virtues or excoriating itsfaults. Wireless networking refers to technology thatenables two or more computers to communicate usingstandard network protocols, but without network cabling. Ifa user, application or company wishes to make dataportable, mobile and accessible then wireless networking isthe answer. A wireless networking system would rid of thedowntime you would normally have in a wired network dueto cable problems. It would also save time and money dueto the fact that you would spare the expense of installing alot of cables. Also, if a client computer needs to relocate toanother part of the office then all you need to do is movethe machine with the wireless network card [1].

  11. ANALYSIS OF SECURITY THREATS IN WIRELESS SENSOR NETWORK

    National Research Council Canada - National Science Library

    Sahabul Alam; Debashis De

    2014-01-01

    .... The inclusion of wireless communication technology also incurs various types of security threats due to unattended installation of sensor nodes as sensor networks may interact with sensitive data...

  12. Flight Testing of Wireless Networking for Nanosat Launch Vehicles Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The innovation proposed here addresses the testing and evaluation of wireless networking technologies for small launch vehicles by leveraging existing nanosat launch...

  13. Expected Transmission Energy Route Metric for Wireless Mesh Senor Networks

    Directory of Open Access Journals (Sweden)

    YanLiang Jin

    2011-01-01

    Full Text Available Mesh is a network topology that achieves high throughput and stable intercommunication. With great potential, it is expected to be the key architecture of future networks. Wireless sensor networks are an active research area with numerous workshops and conferences arranged each year. The overall performance of a WSN highly depends on the energy consumption of the network. This paper designs a new routing metric for wireless mesh sensor networks. Results from simulation experiments reveal that the new metric algorithm improves the energy balance of the whole network and extends the lifetime of wireless mesh sensor networks (WMSNs.

  14. Heterogeneous LEACH Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nishi Sharma

    2013-07-01

    Full Text Available Wireless Sensor Networks are networks of large number of tiny, battery powered sensor nodes having limited on-board storage, processing, and radio capabilities. Nodes sense and send their reports toward a processing center which is called base station. Since this transmission and reception process consumes lots of energy as compare to data processing, Designing protocols and applications for such networks has to be energy aware in order to prolong the lifetime of the network. Generally, real life applications deal with such Heterogeneity rather than Homogeneity. In this paper, a protocol is proposed, which is heterogeneous in energy. We analyze the basic distributed clustering routing protocol LEACH (Low Energy Adaptive Clustering Hierarchy, which is a homogeneous system, and then we study the impact of heterogeneity in energy of nodes to prolong the life time of WSN. Simulation results using MATLAB shows that the proposed Leach-heterogeneous system significantly reduces energy consumption and increase the total lifetime of the wireless sensor network.

  15. Dynamic Resource Management in 802.11 Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    George Athanasiou

    2012-01-01

    Full Text Available The association/handoff procedures are important components in a balanced operation of 802.11-based wireless mesh networks. In this paper, we introduce the concept of cooperative association where the stations (STA can share useful information in order to improve the performance of the association/reassociation procedures. Furthermore, in this work we introduce a load balancing mechanism that can be applied in mesh networks. This mechanism operates in a cross-layer manner taking into account uplink and downlink channel information, routing information, and congestion-based information. Our load balancing mechanism is based on a fairness index that is measured at each access point (AP neighborhood. This index reflects the way the communication load is shared in the neighboring APs. The iterative heuristic algorithms that we propose controls the communication load of each mesh AP in a distributed manner. We evaluate the performance of our mechanisms through OPNET simulations.

  16. High availability of hybrid wireless networks

    Science.gov (United States)

    Leitgeb, Erich; Gebhart, Michael; Birnbacher, Ulla; Kogler, Wolfgang; Schrotter, Peter

    2004-09-01

    Free Space Optical (FSO) links offer high bandwidth and the flexibility of wireless communication links. However, the availability of FSO links is limited by weather patterns like fog and heavy snowfall. Microwave based communication links operating at high frequencies (40 - 43 GHz) have similar characteristics like high data rates and needed line-of-sight. Link availability for microwave systems is limited by heavy rain. Combining FSO links with microwave links within a hybrid FSO/microwave communication network has the advantage of added redundancy and higher link availability. Measurements over a period of one year show a combined availability of 99.93% for the climatic region of Graz, Austria) which proves that the combination of both technologies leads to a highly available wireless connection offering high bandwidth.

  17. Proportional Fair Coding for Wireless Mesh Networks

    CERN Document Server

    Karumbu, Premkumar; Leith, Douglas

    2012-01-01

    We consider multi--hop wireless networks carrying unicast flows for multiple users. Each flow has a specified delay deadline, and the lossy wireless links are modelled as binary symmetric channels (BSCs). Since transmission time, also called airtime, on the links is shared amongst flows, increasing the airtime for one flow comes at the cost of reducing the airtime available to other flows sharing the same link. We derive the joint allocation of flow airtimes and coding rates that achieves the proportionally fair throughput allocation. This utility optimisation problem is non--convex, and one of the technical contributions of this paper is to show that the proportional fair utility optimisation can nevertheless be decomposed into a sequence of convex optimisation problems. The solution to this sequence of convex problems is the unique solution to the original non--convex optimisation. Surprisingly, this solution can be written in an explicit form that yields considerable insight into the nature of the proporti...

  18. Design and Implementation of Large Wireless Network

    OpenAIRE

    Bujnoch, Aleš

    2010-01-01

    Tato bakalářská práce se zabývá technologiemi bezdrátové komunikace a realizací bezdrátové sítě postavené na technologii 4. generace WiFi. Obsahem jsou informace o technologiích bezdrátového přenosu dat, praktickou částí je návrh a vybudování rozsáhlé WiFi sítě pomocí blanket technologie prostřednictvím produktů Extricom. The topic of this Bachelor Thesis is wireless technology and realization of wireless networks built on fourth generation WiFi technology.The work contains information abo...

  19. Mechanisms for Prolonging Network Lifetime in Wireless Sensor Networks

    Science.gov (United States)

    Yang, Yinying

    2010-01-01

    Sensors are used to monitor and control the physical environment. A Wireless Sensor Network (WSN) is composed of a large number of sensor nodes that are densely deployed either inside the phenomenon or very close to it [18][5]. Sensor nodes measure various parameters of the environment and transmit data collected to one or more sinks, using…

  20. Energy Consumption in Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    JIN Yan; WANG Ling; YANG Xiao-zong; WEN Dong-xin

    2007-01-01

    Wireless sensor networks (WSNs) can be used to collect surrounding data by multi-hop. As sensor networks have the constrained and not rechargeable energy resource, energy efficiency is an important design issue for its topology. In this paper, the energy consumption issue under the different topology is studied. We derive the exact mathematical expression of energy consumption for the fiat and clustering scheme, respectively. Then the energy consumptions of different schemes are compared. By the comparison, multi-level clustering scheme is more energy efficient in large scale networks. Simulation results demonstrate that our analysis is correct from the view of prolonging the large-scale network lifetime and achieving more power reductions.

  1. Graphical Model Theory for Wireless Sensor Networks

    Energy Technology Data Exchange (ETDEWEB)

    Davis, William B.

    2002-12-08

    Information processing in sensor networks, with many small processors, demands a theory of computation that allows the minimization of processing effort, and the distribution of this effort throughout the network. Graphical model theory provides a probabilistic theory of computation that explicitly addresses complexity and decentralization for optimizing network computation. The junction tree algorithm, for decentralized inference on graphical probability models, can be instantiated in a variety of applications useful for wireless sensor networks, including: sensor validation and fusion; data compression and channel coding; expert systems, with decentralized data structures, and efficient local queries; pattern classification, and machine learning. Graphical models for these applications are sketched, and a model of dynamic sensor validation and fusion is presented in more depth, to illustrate the junction tree algorithm.

  2. Wireless traffic steering for green cellular networks

    CERN Document Server

    Zhang, Shan; Zhou, Sheng; Niu, Zhisheng; Shen, Xuemin (Sherman)

    2016-01-01

    This book introduces wireless traffic steering as a paradigm to realize green communication in multi-tier heterogeneous cellular networks. By matching network resources and dynamic mobile traffic demand, traffic steering helps to reduce on-grid power consumption with on-demand services provided. This book reviews existing solutions from the perspectives of energy consumption reduction and renewable energy harvesting. Specifically, it explains how traffic steering can improve energy efficiency through intelligent traffic-resource matching. Several promising traffic steering approaches for dynamic network planning and renewable energy demand-supply balancing are discussed. This book presents an energy-aware traffic steering method for networks with energy harvesting, which optimizes the traffic allocated to each cell based on the renewable energy status. Renewable energy demand-supply balancing is a key factor in energy dynamics, aimed at enhancing renewable energy sustainability to reduce on-grid energy consum...

  3. Enhanced Network Throughput of Wireless Network for Digital Video Transmission

    Directory of Open Access Journals (Sweden)

    S.M. Koli

    2013-03-01

    Full Text Available Digital video transmission using wireless technology is an important functionality in multimediacommunication. Such wireless transmission considers various parameters of channel like reliability,quality of service (QoS, transmission rate, transmission delay etc. User datagram protocol (UDP is afast transmission protocol used by most of the real-time applications as it is suitable for delay sensitiveapplications like video and audio transmission. UDP does not provide flow control or error recovery anddoes not require connection management. Since more applications with real-time constraints areintroduced day by day, both over wired and over wireless, some improvements should be made in orderto obtain better end to end performance. This paper surveys the literature on real time communicationover wireless and suggests an intermediate solution providing more reliability in transmission usingadaptive error control mechanism. The idea used is to inject an adaptive amount of redundant packets(RPs in every sent block (or datagram in order to achieve a desired recovery rate at the receiverwithout using any retransmission mechanism. The technique used is called adaptive forward errorcontrol (AFEC and is implemented at physical layer. The network simulator NS-2 is used to evaluateAFEC and the simulation results indicate that the suggested methods can guarantee enhanced networkthroughput for video transmission in the high packet loss wireless network.

  4. Real-time network traffic classification technique for wireless local area networks based on compressed sensing

    Science.gov (United States)

    Balouchestani, Mohammadreza

    2017-05-01

    Network traffic or data traffic in a Wireless Local Area Network (WLAN) is the amount of network packets moving across a wireless network from each wireless node to another wireless node, which provide the load of sampling in a wireless network. WLAN's Network traffic is the main component for network traffic measurement, network traffic control and simulation. Traffic classification technique is an essential tool for improving the Quality of Service (QoS) in different wireless networks in the complex applications such as local area networks, wireless local area networks, wireless personal area networks, wireless metropolitan area networks, and wide area networks. Network traffic classification is also an essential component in the products for QoS control in different wireless network systems and applications. Classifying network traffic in a WLAN allows to see what kinds of traffic we have in each part of the network, organize the various kinds of network traffic in each path into different classes in each path, and generate network traffic matrix in order to Identify and organize network traffic which is an important key for improving the QoS feature. To achieve effective network traffic classification, Real-time Network Traffic Classification (RNTC) algorithm for WLANs based on Compressed Sensing (CS) is presented in this paper. The fundamental goal of this algorithm is to solve difficult wireless network management problems. The proposed architecture allows reducing False Detection Rate (FDR) to 25% and Packet Delay (PD) to 15 %. The proposed architecture is also increased 10 % accuracy of wireless transmission, which provides a good background for establishing high quality wireless local area networks.

  5. Comparative Study of Cooperation Tools for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    J. Molina-Gil

    2016-01-01

    Full Text Available Mobile ad hoc networks are formed spontaneously to use the wireless medium for communication among nodes. Each node in this type of network is its own authority and has an unpredictable behaviour. These features involve a cooperation challenge that has been addressed in previous proposals with methods based on virtual currencies. In this work, those methods have been simulated in NS-2 and the results have been analyzed, showing several weaknesses. In particular, it has been concluded that existent methods do not provide significant advances compared with networks without any mechanism for promoting cooperation. Consequently, this work presents three new proposals that try to solve those problems. The obtained results show that the new proposals offer significant improvements over previous schemes based on virtual currencies.

  6. Wireless intelligent network: infrastructure before services?

    Science.gov (United States)

    Chu, Narisa N.

    1996-01-01

    The Wireless Intelligent Network (WIN) intends to take advantage of the Advanced Intelligent Network (AIN) concepts and products developed from wireline communications. However, progress of the AIN deployment has been slow due to the many barriers that exist in the traditional wireline carriers' deployment procedures and infrastructure. The success of AIN has not been truly demonstrated. The AIN objectives and directions are applicable to the wireless industry although the plans and implementations could be significantly different. This paper points out WIN characteristics in architecture, flexibility, deployment, and value to customers. In order to succeed, the technology driven AIN concept has to be reinforced by the market driven WIN services. An infrastructure suitable for the WIN will contain elements that are foreign to the wireline network. The deployment process is expected to seed with the revenue generated services. Standardization will be achieved by simplifying and incorporating the IS-41C, AIN, and Intelligent Network CS-1 recommendations. Integration of the existing and future systems impose the biggest challenge of all. Service creation has to be complemented with service deployment process which heavily impact the carriers' infrastructure. WIN deployment will likely start from an Intelligent Peripheral, a Service Control Point and migrate to a Service Node when sufficient triggers are implemented in the mobile switch for distributed call control. The struggle to move forward will not be based on technology, but rather on the impact to existing infrastructure.

  7. EESA Algorithm in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Pei Zhang

    2014-04-01

    Full Text Available Since there are many problems of traditional extended clustering algorithm in wireless sensor network like short extended time, over energy consumption, too many deviated position the of cluster head nodes and so on, this paper proposes the EESA algorithm. The algorithm makes many improvements on the way of dividing clusters, strategy of electing the cluster head and construction method of data relay path, the two aspects of inter-cluster energy balance and energy balance among the cluster are taken into account at the same time. Detailed simulation results are taken in this thesis to compare network lifetime, average residual energy, energy consumption standard deviation of cluster head node and changes of average remaining energy between the EESA algorithm and ACT algorithm, EECA algorithm and MR-LEACH algorithm; the simulation results show that: the proposed algorithm reduces the load of hot regional cluster head, balances the energy consumption of the entire network nodes and extends the networks lifetime of wireless sensor

  8. Crystallization in large wireless networks

    CERN Document Server

    Morgenshtern, Veniamin I

    2007-01-01

    We analyze fading interference relay networks where M single-antenna source-destination terminal pairs communicate concurrently and in the same frequency band through a set of K single-antenna relays using half-duplex two-hop relaying. Assuming that the relays have channel state information (CSI), it is shown that in the large-M limit, provided K grows fast enough as a function of M, the network "decouples" in the sense that the individual source-destination terminal pair capacities are strictly positive. The corresponding required rate of growth of K as a function of M is found to be sufficient to also make the individual source-destination fading links converge to nonfading links. We say that the network "crystallizes" as it breaks up into a set of effectively isolated "wires in the air". A large-deviations analysis is performed to characterize the "crystallization" rate, i.e., the rate (as a function of M,K) at which the decoupled links converge to nonfading links. In the course of this analysis, we develo...

  9. Cooperation on Social Networks and Its Robustness

    CERN Document Server

    Antonioni, Alberto

    2012-01-01

    In this work we have used computer models of social-like networks to show by extensive numerical simulations that cooperation in evolutionary games can emerge and be stable on this class of networks. The amounts of cooperation reached are at least as much as in scale-free networks but here the population model is more realistic. Cooperation is robust with respect to different strategy update rules, population dynamics, and payoff computation. Only when straight average payoff is used or there is high strategy or network noise does cooperation decrease in all games and disappear in the Prisoner's Dilemma.

  10. A tutorial survey of topics in wireless networking: Part II

    Indian Academy of Sciences (India)

    Anurag Kumar; D Manjunath

    2007-12-01

    This is the second part of the survey of recent and emerging topics in wireless networking. We provide an overview of the area of wireless networking as that of dealing with problems of resource allocation so that the various connections that utilise the network achieve their desired performance objectives. In Part I we provided a taxonomy of wireless networks as they have been deployed. We then provided a quick survey of the main issues in the wireless 'physical' layer. We then discussed some resource allocation formulations in CDMA (code division multiple access) cellular networks and OFDMA (orthogonal frequency division multiple access) networks. In this part we begin with a discussion of random access wireless networks. We first provide an overview of the evolution of random access networks from Aloha to the currently popular 802·11 (Wi-Fi) networks. We then analyse the performance of the 802·11 random access protocol. We briefly discuss the problem of optimal association of nodes to Wi-Fi access points. Next, we consider topics in ad hoc multihop wireless networks. We first discuss topology and cross layer control. For the latter, we describe the important maximum weight link scheduling algorithm. The connectivity and capacity of randomly deployed networks are then analysed. Finally, we provide an overview of the technical issues in the emerging area of wireless sensor networks.

  11. A tutorial survey of topics in wireless networking: Part I

    Indian Academy of Sciences (India)

    Anurag Kumar; D Manjunath

    2007-12-01

    In this two part paper, we provide a survey of recent and emerging topics in wireless networking. We view the area of wireless networking as dealing with problems of resource allocation so that the various connections that utilise the network achieve their desired performance objectives. In the first part of the paper, we first survey the area by providing a taxonomy of wireless networks as they have been deployed. Then, we provide a quick tutorial on the main issues in the wireless ‘physical’ layer, which is concerned with transporting bits over the radio frequency spectrum. Then, we proceed to discuss some resource allocation formulations in CDMA (code division multiple access) cellular networks and OFDMA (orthogonal frequency division multiple access) networks. In the second part of the paper, we first analyse random access wireless networks and pay special attention to 802·11 (Wi-Fi) networks. We then survey some topics in ad hoc multihop wireless networks, where we discuss arbitrary networks, as well as some theory of dense random networks. Finally, we provide an overview of the technical issues in the emerging area of wireless sensor networks.

  12. Developing a Collaborative and Autonomous Training and Learning Environment for Hybrid Wireless Networks

    CERN Document Server

    Lobo, Jose Eduardo M; Brust, Matthias R; Rothkugel, Steffen; Adriano, Christian M

    2007-01-01

    With larger memory capacities and the ability to link into wireless networks, more and more students uses palmtop and handheld computers for learning activities. However, existing software for Web-based learning is not well-suited for such mobile devices, both due to constrained user interfaces as well as communication effort required. A new generation of applications for the learning domain that is explicitly designed to work on these kinds of small mobile devices has to be developed. For this purpose, we introduce CARLA, a cooperative learning system that is designed to act in hybrid wireless networks. As a cooperative environment, CARLA aims at disseminating teaching material, notes, and even components of itself through both fixed and mobile networks to interested nodes. Due to the mobility of nodes, CARLA deals with upcoming problems such as network partitions and synchronization of teaching material, resource dependencies, and time constraints.

  13. Wireless Networks with RF Energy Harvesting: A Contemporary Survey

    OpenAIRE

    Lu, Xiao; Wang,Ping; Niyato, Dusit; Kim, Dong In; Han, Zhu

    2014-01-01

    Radio frequency (RF) energy transfer and harvesting techniques have recently become alternative methods to power the next generation wireless networks. As this emerging technology enables proactive energy replenishment of wireless devices, it is advantageous in supporting applications with quality of service (QoS) requirement. In this paper, we present an extensive literature review on the research progresses in wireless networks with RF energy harvesting capability, referred to as RF energy ...

  14. Fractional Power Control for Decentralized Wireless Networks

    CERN Document Server

    Jindal, Nihar; Andrews, Jeffrey G

    2007-01-01

    We propose and analyze a new paradigm for power control in decentralized wireless networks, termed fractional power control. Transmission power is chosen as the current channel quality raised to an exponent -s, where s is a constant between 0 and 1. Choosing s = 1 and s = 0 correspond to the familiar cases of channel inversion and constant power transmission, respectively. Choosing s in (0, 1) allows all intermediate policies between these two extremes to be evaluated, and we see that neither extreme is ideal. We prove that using an exponent of s = 1/2 optimizes the transmission capacity of an ad hoc network, meaning that the inverse square root of the channel strength is the optimal transmit power scaling. Intuitively, this choice achieves the optimal balance between helping disadvantaged users while making sure they do not flood the network with interference.

  15. Wireless Secrecy in Large-Scale Networks

    CERN Document Server

    Pinto, Pedro C; Win, Moe Z

    2011-01-01

    The ability to exchange secret information is critical to many commercial, governmental, and military networks. The intrinsically secure communications graph (iS-graph) is a random graph which describes the connections that can be securely established over a large-scale network, by exploiting the physical properties of the wireless medium. This paper provides an overview of the main properties of this new class of random graphs. We first analyze the local properties of the iS-graph, namely the degree distributions and their dependence on fading, target secrecy rate, and eavesdropper collusion. To mitigate the effect of the eavesdroppers, we propose two techniques that improve secure connectivity. Then, we analyze the global properties of the iS-graph, namely percolation on the infinite plane, and full connectivity on a finite region. These results help clarify how the presence of eavesdroppers can compromise secure communication in a large-scale network.

  16. Autonomic Context-Aware Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nídia G. S. Campos

    2015-01-01

    Full Text Available Autonomic Computing allows systems like wireless sensor networks (WSN to self-manage computing resources in order to extend their autonomy as much as possible. In addition, contextualization tasks can fuse two or more different sensor data into a more meaningful information. Since these tasks usually run in a single centralized context server (e.g., sink node, the massive volume of data generated by the wireless sensors can lead to a huge information overload in such server. Here we propose DAIM, a distributed autonomic inference machine distributed which allows the sensor nodes to do self-management and contextualization tasks based on fuzzy logic. We have evaluated DAIM in a real sensor network taking into account other inference machines. Experimental results illustrate that DAIM is an energy-efficient contextualization method for WSN, reducing 48.8% of the number of messages sent to the context servers while saving 19.5% of the total amount of energy spent in the network.

  17. Track classification within wireless sensor network

    Science.gov (United States)

    Doumerc, Robin; Pannetier, Benjamin; Moras, Julien; Dezert, Jean; Canevet, Loic

    2017-05-01

    In this paper, we present our study on track classification by taking into account environmental information and target estimated states. The tracker uses several motion model adapted to different target dynamics (pedestrian, ground vehicle and SUAV, i.e. small unmanned aerial vehicle) and works in centralized architecture. The main idea is to explore both: classification given by heterogeneous sensors and classification obtained with our fusion module. The fusion module, presented in his paper, provides a class on each track according to track location, velocity and associated uncertainty. To model the likelihood on each class, a fuzzy approach is used considering constraints on target capability to move in the environment. Then the evidential reasoning approach based on Dempster-Shafer Theory (DST) is used to perform a time integration of this classifier output. The fusion rules are tested and compared on real data obtained with our wireless sensor network.In order to handle realistic ground target tracking scenarios, we use an autonomous smart computer deposited in the surveillance area. After the calibration step of the heterogeneous sensor network, our system is able to handle real data from a wireless ground sensor network. The performance of this system is evaluated in a real exercise for intelligence operation ("hunter hunt" scenario).

  18. Fiber Optic Infrastructure for Wireless Communication Networks

    Science.gov (United States)

    Lau, Kam Y.; Cutrer, David M.; Georges, John B.; Yeung, Simon

    It is clear that to meet the new demands of wireless customers, conventional cellular service providers and upcoming Personal Communication Service (PCS) providers for conventional phone service and high bandwidth wireless LAN must upgrade their networks to provide complete radio coverage. This evolution has motivated the need for low-cost systems that transport radio signals to and from areas of poor signal coverage. The most important area where this problem must be solved is inside of buildings, since this is where people spend most of their time. Unfortunately, the in-building environment is also the most challenging area to provide radio coverage due to severe attenuation and multi-path effects. The problem must be tackled from the viewpoint of optimization of performance/cost ratio of the network. In this paper, we describe a system-level approach to tackle this problem. We demonstrate how one can trade-off hardware performance, which represent cost, with proper choice of system architecture which includes, among other factors, in-building radio environment, to arrive at an optimum network solution technically and economically.

  19. Wireless Network Code Design and Performance Analysis using Diversity-Multiplexing Tradeoff

    CERN Document Server

    Topakkaya, Hakan

    2010-01-01

    Network coding and cooperative communication have received considerable attention from the research community recently in order to mitigate the adverse effects of fading in wireless transmissions and at the same time to achieve high throughput and better spectral efficiency. In this work, we design and analyze deterministic and random network coding schemes for a cooperative communication setup with multiple sources and destinations. We show that our schemes outperform conventional cooperation in terms of the diversity-multiplexing tradeoff (DMT). Specifically, it achieves the full-diversity order at the expense of a slightly reduced multiplexing rate. We establish the link between the parity-check matrix for a $(N+M,M,N+1)$ systematic MDS code and the network coding coefficients in a cooperative communication system of $N$ source-destination pairs and $M$ relays. We present two ways to generate the network coding matrix: using the Cauchy matrices and the Vandermonde matrices, and establish that they both off...

  20. BABY MONITORING SYSTEM USING WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    G. Rajesh

    2014-09-01

    Full Text Available Sudden Infant Death Syndrome (SIDS is marked by the sudden death of an infant during sleep that is not predicted by the medical history and remains unexplained even after thorough forensic autopsy and detailed death investigation. In this we developed a system that provides solutions for the above problems by making the crib smart using the wireless sensor networks (WSN and smart phones. The system provides visual monitoring service through live video, alert services by crib fencing and awakens alert, monitoring services by temperature reading and light intensity reading, vaccine reminder and weight monitoring.

  1. Wireless sensor networks and ecological monitoring

    CERN Document Server

    Jiang, Joe-Air

    2013-01-01

    This book presents the state of the art technologies and solutions to tackle the critical challenges faced by the building and development of the WSN and ecological monitoring system but also potential impact on society at social, medical and technological level. This book is dedicated to Sensing systems for Sensors, Wireless Sensor Networks and Ecological Monitoring. The book aims at Master and PhD degree students, researchers, practitioners, especially WSN engineers involved with ecological monitoring. The book will provide an opportunity of a dedicated and a deep approach in order to improve their knowledge in this specific field.  

  2. Wireless sensor networks from theory to applications

    CERN Document Server

    El Emary, Ibrahiem M M

    2013-01-01

    Although there are many books available on WSNs, most are low-level, introductory books. The few available for advanced readers fail to convey the breadth of knowledge required for those aiming to develop next-generation solutions for WSNs. Filling this void, Wireless Sensor Networks: From Theory to Applications supplies comprehensive coverage of WSNs. In order to provide the wide-ranging guidance required, the book brings together the contributions of domain experts working in the various subfields of WSNs worldwide. This edited volume examines recent advances in WSN technologies and consider

  3. Wireless sensors networks MAC protocols analysis

    CERN Document Server

    Chaari, Lamia

    2010-01-01

    Wireless sensors networks performance are strictly related to the medium access mechanism. An effective one, require non-conventional paradigms for protocol design due to several constraints. An adequate equilibrium between communication improvement and data processing capabilities must be accomplished. To achieve low power operation, several MAC protocols already proposed for WSN. The aim of this paper is to survey and to analyze the most energy efficient MAC protocol in order to categorize them and to compare their performances. Furthermore we have implemented some of WSN MAC protocol under OMNET++ with the purpose to evaluate their performances.

  4. Wireless multimedia sensor networks on reconfigurable hardware information reduction techniques

    CERN Document Server

    Ang, Li-minn; Chew, Li Wern; Yeong, Lee Seng; Chia, Wai Chong

    2013-01-01

    Traditional wireless sensor networks (WSNs) capture scalar data such as temperature, vibration, pressure, or humidity. Motivated by the success of WSNs and also with the emergence of new technology in the form of low-cost image sensors, researchers have proposed combining image and audio sensors with WSNs to form wireless multimedia sensor networks (WMSNs).

  5. Artificial intelligence based event detection in wireless sensor networks

    NARCIS (Netherlands)

    Bahrepour, Majid

    2013-01-01

    Wireless sensor networks (WSNs) are composed of large number of small, inexpensive devices, called sensor nodes, which are equipped with sensing, processing, and communication capabilities. While traditional applications of wireless sensor networks focused on periodic monitoring, the focus of more r

  6. Sending policies in dynamic wireless mesh using network coding

    DEFF Research Database (Denmark)

    Pandi, Sreekrishna; Fitzek, Frank; Pihl, Jeppe

    2015-01-01

    This paper demonstrates the quick prototyping capabilities of the Python-Kodo library for network coding based performance evaluation and investigates the problem of data redundancy in a network coded wireless mesh with opportunistic overhearing. By means of several wireless meshed architectures ...

  7. Energy-efficient wireless networking for multimedia applications

    NARCIS (Netherlands)

    Havinga, Paul J.M.; Smit, Gerardus Johannes Maria

    In this paper we identify the most prominent problems of wireless multimedia networking and present several state-of-the-art solutions with a focus on energy efficiency. Three key problems in networked wireless multimedia systems are: (1) the need to maintain a minimum quality of service over

  8. Utilising eduroam[TM] Architecture in Building Wireless Community Networks

    Science.gov (United States)

    Huhtanen, Karri; Vatiainen, Heikki; Keski-Kasari, Sami; Harju, Jarmo

    2008-01-01

    Purpose: eduroam[TM] has already been proved to be a scalable, secure and feasible way for universities and research institutions to connect their wireless networks into a WLAN roaming community, but the advantages of eduroam[TM] have not yet been fully discovered in the wireless community networks aimed at regular consumers. This aim of this…

  9. Transmit Power Optimisation in Wireless Network

    Directory of Open Access Journals (Sweden)

    Besnik Terziu

    2011-09-01

    Full Text Available Transmit power optimisation in wireless networks based on beamforming have emerged as a promising technique to enhance the spectrum efficiency of present and future wireless communication systems. The aim of this study is to minimise the access point power consumption in cellular networks while maintaining a targeted quality of service (QoS for the mobile terminals. In this study, the targeted quality of service is delivered to a mobile station by providing a desired level of Signal to Interference and Noise Ratio (SINR. Base-stations are coordinated across multiple cells in a multi-antenna beamforming system. This study focuses on a multi-cell multi-antenna downlink scenario where each mobile user is equipped with a single antenna, but where multiple mobile users may be active simultaneously in each cell and are separated via spatial multiplexing using beamforming. The design criteria is to minimize the total weighted transmitted power across the base-stations subject to SINR constraints at the mobile users. The main contribution of this study is to define an iterative algorithm that is capable of finding the joint optimal beamformers for all basestations, based on a correlation-based channel model, the full-correlation model. Among all correlated channel models, the correlated channel model used in this study is the most accurate, giving the best performance in terms of power consumption. The environment here in this study is chosen to be Non-Light of- Sight (NLOS condition, where a signal from a wireless transmitter passes several obstructions before arriving at a wireless receiver. Moreover there are many scatterers local to the mobile, and multiple reflections can occur among them before energy arrives at the mobile. The proposed algorithm is based on uplink-downlink duality using the Lagrangian duality theory. Time-Division Duplex (TDD is chosen as the platform for this study since it has been adopted to the latest technologies in Fourth

  10. Convergence of wireless, wireline, and photonics next generation networks

    CERN Document Server

    Iniewski, Krzysztof

    2010-01-01

    Filled with illustrations and practical examples from industry, this book provides a brief but comprehensive introduction to the next-generation wireless networks that will soon replace more traditional wired technologies. Written by a mixture of top industrial experts and key academic professors, it is the only book available that covers both wireless networks (such as wireless local area and personal area networks) and optical networks (such as long-haul and metropolitan networks) in one volume. It gives engineers and engineering students the necessary knowledge to meet challenges of next-ge

  11. A TRIVIAL AND DEPENDABLE FAITH SCHEME FOR CLUSTERED WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    Ramya. M

    2015-11-01

    Full Text Available Wireless Sensor networks (WSN are a special type of wireless networks. The clustered wireless sensor networks are incapable of satisfying the resource efficiency and dependability of a trust system because of the high overhead and low dependability. A Lightweight and dependable trust system for wireless sensor networks are used to WSNs, which employees the Clustering Algorithm. A lightweight trust decision-making scheme is based on the nodes’ identities in the clustered WSNs, which is suitable for such WSNs because it facilitates energy-saving. Due to canceling feedback between cluster members and cluster heads, this approach can significantly improve system efficiency while reducing the effect of malicious nodes. The Cluster heads take on large amounts of data forwarding and communication tasks, a dependability-enhanced trust evaluating approach is defined for co-operations between CHs. This approach can effectively reduce the networking consumption and thus prevents malicious, selfish, and faulty Cluster heads. A self-adaptive weighted method is defined for trust aggregation at Cluster head level. Even though this enhances the energy efficiency and confirms the trustworthiness of nodes that participate in the communication. This approach surpasses the limitations of traditional weighting methods for trust factors, in which weights are assigned subjectively. LDTS uses the benefits of an energy-efficient, less memory and communication overhead in wireless sensor networks.

  12. Competing Through Cooperation: The Organization of Standard Setting in Wireless Telecommunications

    OpenAIRE

    Aija Elina Leiponen

    2008-01-01

    This study examines cooperative standard setting in wireless telecommunications. Focusing on the competition among firms to influence formal standardization, the roles of standard-setting committees, private alliances, and industry consortia are highlighted. The empirical context is Third Generation Partnership Project (3GPP), an international standards-development organization in the wireless telecommunication industry. Panel data analyses exploiting natural experiments caused by a consortiu...

  13. 802.11 Wireless Networks The Definitive Guide

    CERN Document Server

    Gast, Matthew S

    2005-01-01

    As we all know by now, wireless networks offer many advantages over fixed (or wired) networks. Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain. The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware avail

  14. Evolution of Cooperation on Temporal Networks

    CERN Document Server

    Li, Aming; Su, Qi; Cornelius, Sean P; Liu, Yang-Yu; Wang, Long

    2016-01-01

    The structure of social networks is a key determinant in fostering cooperation and other altruistic behavior among naturally selfish individuals. However, most real social interactions are temporal, being both finite in duration and spread out over time. This raises the question of whether stable cooperation can form despite an intrinsically fragmented social fabric. Here we develop a framework to study the evolution of cooperation on temporal networks in the setting of the classic Prisoner's Dilemma. By analyzing both real and synthetic datasets, we find that temporal networks generally facilitate the evolution of cooperation compared to their static counterparts. More interestingly, we find that the intrinsic human interactive pattern like bursty behavior impedes the evolution of cooperation. Finally, we introduce a measure to quantify the temporality present in networks and demonstrate that there is an intermediate level of temporality that boosts cooperation most. Our results open a new avenue for investi...

  15. Autonomic computing enabled cooperative networked design

    CERN Document Server

    Wodczak, Michal

    2014-01-01

    This book introduces the concept of autonomic computing driven cooperative networked system design from an architectural perspective. As such it leverages and capitalises on the relevant advancements in both the realms of autonomic computing and networking by welding them closely together. In particular, a multi-faceted Autonomic Cooperative System Architectural Model is defined which incorporates the notion of Autonomic Cooperative Behaviour being orchestrated by the Autonomic Cooperative Networking Protocol of a cross-layer nature. The overall proposed solution not only advocates for the inc

  16. Cooperative Wireless Communications and Physical Layer Security : State of the Art

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee

    2012-01-01

    in the mobile equipment is not feasible due to resource constraints. Cooperative wireless communication (CWC) is the upcoming virtual MIMO technique to combat fading and achieve diversity through user cooperation. Physical layer security (PLS) is the imminent security guarantee for the cooperative communication....... was present there started shouting ”stop, stop the bus”. And the sound finally reached the bus driver and he stopped the bus and the employee could catch it in time. This analogy from everyday realistic life simply depicts the spirit of cooperative wireless communication which utilizes the information...

  17. COMPARATIVE STUDY OF NEXT GENERATION HIGH SPEED WIRELESS NETWORK

    Directory of Open Access Journals (Sweden)

    RAHUL MALHOTRA

    2011-06-01

    Full Text Available Advances in mobile communication theory have enabled the development of different wireless access technologies. Alongside the revolutionary progress in wireless access technologies, advances in wireless access devices such as laptops, palmtops, and cell phones and mobile middleware have paved the way for the deliveryof beyond-voice-type services while on the move. This sets the platform for high-speed mobile communications that provide high-speed data and both real and non-real time multimedia to mobile users. Today's wireless world uses several communication infrastructures such as Bluetooth for personal area, IEEE 802.11 for local area,Universal Mobile Telecommunication System (UMTS for wide area, and Satellite networks for global networking other hand, since these wireless networks are complementary to each other, their integration and coordinated operation can provide ubiquitous “always best connection" quality mobile communications to the users. This paper discusses the different architectures of wireless networks and the different factors to be considered while designing a hybrid wireless network. The different factors to be considered for design of ahybrid wireless network and the different networks have been explored in this paper.

  18. A Combinational Perspective in Stimulating Cooperation in Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    Mahshid Rahnamay-Naeini; Masoud Sabaei

    2011-01-01

    In wireless ad hoc networks cooperation among nodes cannot always be assumed since nodes with limited resources and different owners are capable of making independent decisions. Cooperation problems in topology control and packet forwarding tasks have been mostly studied separately but these two tasks are not independent. Considering a joint cooperation problem by taking into account dependencies between tasks will result in more reliable and efficient networks. In this paper topology control definition is extended to cover cooperation problem in both packet forwarding and topology control in a single problem. In this definition nodes have to adjust their transmission power and decide on their relay role. This paper models the interactions of nodes as a potential game with two-dimensional utility function. The presented model, named TCFORCE (Topology Control packet FORwarding Cooperation Enforcement), preserves the network connectivity and reduces the energy consumption by providing cooperative paths between all pairs of nodes in the network.

  19. Energy-efficient multipath routing in wireless sensor network considering wireless interference

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Due to the energy and resource constraints of a wireless sensor node in a wireless sensor network (WSN), design of energy-efficient multipath routing protocols is a crucial concern for WSN applications. To provide high-quality monitoring information, many WSN applications require high-rate data transmission. Multipath routing protocols are often used to increase the network transmission rate and throughput. Although large-scale WSN can be supported by high bandwidth backbone network, the WSN remains the bot...

  20. Cooperative and networking strategies in small business

    CERN Document Server

    Ferreira, João

    2017-01-01

    The book aims to collect the most recent research and best practices in the cooperative and networking small business field identifying new theoretical models and describing the relationship between cooperation and networks in the small business strategy context. It examines different concepts and analytical techniques better understand the links between cooperative strategies and networks in small business. It also studies the existing economic conditions of network and strategic implications to small business from the point of view of their internal and external consistency. Cooperation and networks is a fashionable topic. It is receiving increasing attention in popular management publications, as well as specialized academic journals. Cooperation between firms and industries is a means of leveraging and aggregating knowledge also generating direct benefits in terms of innovation, productivity and competitiveness. Various options and decisions made within the framework of strategic alliances may be identifi...

  1. A Formal Evaluation of the Security Schemes for Wireless Networks

    Directory of Open Access Journals (Sweden)

    Shadi R. Masadeh

    2011-09-01

    Full Text Available Information security is a critical issue in the wireless network, because the transmission media is open (no physical control on the air. Any wireless device equipped with wireless interface can use and share the airwave transmission medium with other users. For protection purposes, several security mechanisms have been developed over years. This paper provides systematic evaluation of different security schemes used in wireless networks: WEP, TKIP, WPA, AES and WPA2. A formal comparison is made between these security algorithms for different settings such as different data types, different packet sizes and traffic loads.

  2. An Efficient ECDSA-Based Signature Scheme for Wireless Networks

    Institute of Scientific and Technical Information of China (English)

    XU Zhong; DAI Guanzhong; YANG Deming

    2006-01-01

    Wired equivalent security is difficult to provide in wireless networks due to high dynamics, wireless link vulnerability, and decentralization. The Elliptic Curve Digital Signature Algorithm(ECDSA) has been applied to wireless networks because of its low computational cost and short key size, which reduces the overheads in a wireless environment. This study improves the ECDSA scheme by reducing its time complexity. The significant advantage of the algorithm is that our new scheme needs not to calculate modular inverse operation in the phases of signature generation and signature verification. Such an improvement makes the proposed scheme more efficient and secure.

  3. Existing PON Infrastructure Supported Hybrid Fiber-Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yu, Xianbin; Zhao, Ying; Deng, Lei;

    2012-01-01

    We propose a hybrid fiber wireless sensor network based on the existing PON infrastructure. The feasibility of remote sensing and PON convergence is experimentally proven by transmitting direct-sequence spread-spectrum wireless sensing and 2.5Gbps GPON signals.......We propose a hybrid fiber wireless sensor network based on the existing PON infrastructure. The feasibility of remote sensing and PON convergence is experimentally proven by transmitting direct-sequence spread-spectrum wireless sensing and 2.5Gbps GPON signals....

  4. Lifetime maximization routing with network coding in wireless multihop networks

    Institute of Scientific and Technical Information of China (English)

    DING LiangHui; WU Ping; WANG Hao; PAN ZhiWen; YOU XiaoHu

    2013-01-01

    In this paper, we consider the lifetime maximization routing with network coding in wireless mul- tihop networks. We first show that lifetime maximization with network coding is different from pure routing, throughput maximization with network coding and energy minimization with network coding. Then we formulate lifetime maximization problems in three different cases of (i) no network coding, (ii) two-way network coding, and (iii) overhearing network coding. To solve these problems, we use flow augmenting routing (FA) for the first case, and then extend the FA with network coding (FANC) by using energy minimized one-hop network coding. After that, we investigate the influence of parameters of FANC, evaluate the performance of FANC with two-way and overhearing network coding schemes and compare it with that without network coding under two different power control models, namely, protocol and physical ones. The results show that the lifetime can be improved significantly by using network coding, and the performance gain of network coding decreases with the increase of flow asymmetry and the power control ability.

  5. Clustering in Wireless Sensor Networks- A Survey

    Directory of Open Access Journals (Sweden)

    Sukhkirandeep Kaur

    2016-06-01

    Full Text Available Increased demand of Wireless Sensor Networks (WSN in various applications has made it a hot research area. Several challenges imposed which include energy conservation, scalability, limited network resources etc. with energy conservation being the most important. Clustering improves the energy efficiency by making high power nodes as cluster heads (CHs which reduces the chance of energy depletion of nodes. Scalability, fault tolerance, data aggregation, energy efficiency are some of the main objectives of clustering. This paper discusses various challenges associated with clustering and different methods or techniques developed to overcome these challenges. Various clustering approaches have been summarized and few prominent Quality of service (QoS based clustering routing protocols for WSN have been identified. Comparison of these approaches and protocols is discussed based on some parameters.

  6. Node Clustering for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sania Bhatti

    2012-01-01

    Full Text Available Recent years have witnessed considerable growth in the development and deployment of clustering methods which are not only used to maintain network resources but also increases the reliability of the WSNs (Wireless Sensor Network and the facts manifest by the wide range of clustering solutions. Node clustering by selecting key parameters to tackle the dynamic behaviour of resource constraint WSN is a challenging issue. This paper highlights the recent progress which has been carried out pertaining to the development of clustering solutions for the WSNs. The paper presents classification of node clustering methods and their comparison based on the objectives, clustering criteria and methodology. In addition, the potential open issues which need to be considered for future work are high lighted.

  7. Suppressing Redundancy in Wireless Sensor Network Traffic

    Science.gov (United States)

    Abe, Rey; Honiden, Shinichi

    Redundancy suppression is a network traffic compression technique that, by caching recurring transmission contents at receiving nodes, avoids repeatedly sending duplicate data. Existing implementations require abundant memory both to analyze recent traffic for redundancy and to maintain the cache. Wireless sensor nodes at the same time cannot provide such resources due to hardware constraints. The diversity of protocols and traffic patterns in sensor networks furthermore makes the frequencies and proportions of redundancy in traffic unpredictable. The common practice of narrowing down search parameters based on characteristics of representative packet traces when dissecting data for redundancy thus becomes inappropriate. Such difficulties made us devise a novel protocol that conducts a probabilistic traffic analysis to identify and cache only the subset of redundant transfers that yields most traffic savings. We verified this approach to perform close enough to a solution built on exhaustive analysis and unconstrained caching to be practicable.

  8. An Algebraic Watchdog for Wireless Network Coding

    CERN Document Server

    Kim, MinJi; Barros, Joao; Koetter, Ralf

    2009-01-01

    In this paper, we propose a scheme, called the algebraic watchdog for wireless network coding, in which nodes can detect malicious behaviors probabilistically, police their downstream neighbors locally using overheard messages, and, thus, provide a secure global self-checking network. Unlike traditional Byzantine detection protocols which are receiver-based, this protocol gives the senders an active role in checking the node downstream. This work is inspired by Marti et al's watchdog-pathrater, which attempts to detect and mitigate the effects of routing misbehavior. We present a graphical model to understand the inference process nodes execute to police their downstream neighbors; as well as to compute, analyze, and approximate the probabilities of misdetection and false detection. In addition, we present an algebraic analysis of the performance using an hypothesis testing framework, that provides exact formulae for probabilities of false detection and misdetection. Detailed description of the graphical mode...

  9. Decentralized Control of Unmanned Aerial Robots for Wireless Airborne Communication Networks

    Directory of Open Access Journals (Sweden)

    Deok-Jin Lee

    2010-09-01

    Full Text Available This paper presents a cooperative control strategy for a team of aerial robotic vehicles to establish wireless airborne communication networks between distributed heterogeneous vehicles. Each aerial robot serves as a flying mobile sensor performing a reconfigurable communication relay node which enabls communication networks with static or slow-moving nodes on gorund or ocean. For distributed optimal deployment of the aerial vehicles for communication networks, an adaptive hill-climbing type decentralized control algorithm is developed to seek out local extremum for optimal localization of the vehicles. The sensor networks estabilished by the decentralized cooperative control approach can adopt its configuraiton in response to signal strength as the function of the relative distance between the autonomous aerial robots and distributed sensor nodes in the sensed environment. Simulation studies are conducted to evaluate the effectiveness of the proposed decentralized cooperative control technique for robust communication networks.

  10. Design of coordinator to eliminate redundant local retransmission in wireless networks

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Owing to limited bandwidth, high bit error rate, and bursty error in the wireless environment, the performance of the transmission control protocol (TCP) degrades greatly in wireless networks.Up to now, many researchers have contributed greatly to the wireless TCP field.However, in most of their works, the wireless TCP module usually works in the TCP layer and has no idea of the actual time of the packet transmission, which is determined by the Scheduler in the media access control (MAC) layer, and this will bring the inaccuracy to the local retransmission timeout and induce the redundant local retransmission.In this article, a coordinator is introduced into the base-station (BS), which can provide efficient cooperation between the TCP module and the scheduler module.On the bais of the performance analysis and simulation results, the proposed method is shown to eliminate redundant local retransmission, increase throughput, and improve TCP-level fairness in wireless networks.Moreover, this scheme is orthogonal to those existing wireless TCP schemes, thus it can give great compatibility to the current networks, and further enhance the performance of TCP under the condition that the performance improvement benefiting from the existing approaches will not be affected.

  11. RGB Technique of Intrusion Detection in IEEE 802.11 Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    M Salman Ashraf

    2012-03-01

    Full Text Available According to the growth rate of wireless technology, wireless mesh network (WMN usage is significantly increased according to its advantages like inexpensive, fast and easy deployment. WMN have ability, easy to create mesh and provide internet access in a cost efficient manner in any type of area which is unable or costly for wire mediums. Security attacks ratio is higher in wireless mesh network (WMN rather than other wireless or wire technologies. Spy /Malware infected computers generate malicious traffic, which uses valuable network resources and puts other systems at risk. Intrusion detection system (IDS is one of the possible solutions which timely detect the intrusions and alarm for appropriate action. But Limitation of many IDS of WMN are not timely response or unable to share with all nodes due its dynamic network topology and easy access to the radio medium. In this paper, proposed framework is timely detect intrusion and in response to share with all, in both standalone and cooperative manner. This paper also provides the basic sharing mechanism of intrusion for large scale bandwidth wireless mesh networks.

  12. Fundamental Properties of Wireless Mobile Ad-hoc Networks

    NARCIS (Netherlands)

    Hekmat, R.

    2005-01-01

    Wireless mobile ad-hoc networks are formed by mobile devices that set up a possibly short-lived network for communication needs of the moment. Ad-hoc networks are decentralized, self-organizing networks capable of forming a communication network without relying on any fixed infrastructure. Each nod

  13. Evolution of cooperation in multiplex networks.

    Science.gov (United States)

    Gómez-Gardeñes, Jesús; Reinares, Irene; Arenas, Alex; Floría, Luis Mario

    2012-01-01

    We study evolutionary game dynamics on structured populations in which individuals take part in several layers of networks of interactions simultaneously. This multiplex of interdependent networks accounts for the different kind of social ties each individual has. By coupling the evolutionary dynamics of a Prisoner's Dilemma game in each of the networks, we show that the resilience of cooperative behaviors for extremely large values of the temptation to defect is enhanced by the multiplex structure. Furthermore, this resilience is intrinsically related to a non-trivial organization of cooperation across the network layers, thus providing a new way out for cooperation to survive in structured populations.

  14. Guest Editorial: Special Issue on Wireless Mobile Computing and Networking

    Institute of Scientific and Technical Information of China (English)

    Yu Wang; Yanwei Wu; Fan Li; Bin Xu; Teresa Dahlberg

    2011-01-01

    Recent convergence of information communications technology and computing is creating new demands and opportunities for ubiquitous computing via wireless and mobile equipments.The demanding networking environment of wireless communications and the fast-growing number of mobile users impose several challenges in terms of channel estimation,network protocol design,resource management,systematic design,application development,and security.The objective of this special issue is to gather recent advances addressing networks,systems,algorithms,and applications that support the symbiosis of mobile computers and wireless networks.

  15. Association Analaysis in Wireless Network using Trace data

    Directory of Open Access Journals (Sweden)

    L.Velmurugan,

    2010-12-01

    Full Text Available With the explosive growth in wireless devices like smart phones, PDA’s, netbooks, WLAN networks are usually overloaded at workplaces, social and home environments. Though a large number of mobility models have been proposed, a better way is to study wireless mobility traces which gives more accurate movement information for a population. An accurate location predictor can significantly improve the performance or reliability of wireless network protocols and the wireless network infrastructure itself. These improvements lead to a better user experience to a more cost-effective infrastructure or both. In this work, it is proposed to study mobility traces and generate rules for mobility of users which was previously unknown in campus wide wireless network. We also study analyze and show that atcertain locations access points are very rarely used.

  16. FRAMEWORK FOR WIRELESS NETWORK SECURITY USING QUANTUM CRYPTOGRAPHY

    Directory of Open Access Journals (Sweden)

    Priyanka Bhatia

    2014-12-01

    Full Text Available Data that is transient over an unsecured wireless network is always susceptible to being intercepted by anyone within the range of the wireless signal. Hence providing secure communication to keep the user’s information and devices safe when connected wirelessly has become one of the major concerns. Quantum cryptography provides a solution towards absolute communication security over the network by encoding information as polarized photons, which can be sent through the air. This paper explores on the aspect of application of quantum cryptography in wireless networks. In this paper we present a methodology for integrating quantum cryptography and security of IEEE 802.11 wireless networks in terms of distribution of the encryption keys

  17. Throughput Maximization for Wireless Multimedia Sensor Networks in Industrial Applications

    Directory of Open Access Journals (Sweden)

    M.Markco

    2014-06-01

    Full Text Available n recent years, there has been growing interests in wireless sensor networks. Wireless sensor network is an autonomous system of sensor connected by wireless devices without any fixed infrastructure support. To meet the challenge paradigms of wireless sensor networks like Energy efficiency, Delay constraints, Reliability and adaptive mechanis m the sensor nodes are enhanced with multimedia support. The Wireless multimedia sensor nodes (WMSN enable to streamline the data that will control and monitor the industrial activities within the sensing area. The adaptive sleepless protocol will address the following issues: First, this protocol mainly designed for desired packet delivery and delay probabilities while reducing the energy consumption of the network. Second, this protocol is based on demand based dynamic sleep scheduling scheme for data communication. In this packets are transmitted through the cross layer interaction. In this cross layer interaction enables to reach a maximum efficiency.

  18. Mobility Models for Next Generation Wireless Networks Ad Hoc, Vehicular and Mesh Networks

    CERN Document Server

    Santi, Paolo

    2012-01-01

    Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also: Provides up-to-date coverage of mobility models for next generation wireless networksOffers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and

  19. Validation of a wireless accelerometer network for energy expenditure measurement.

    Science.gov (United States)

    Montoye, Alexander H K; Dong, Bo; Biswas, Subir; Pfeiffer, Karin A

    2016-11-01

    The purpose of this study was to validate a wireless network of accelerometers and compare it to a hip-mounted accelerometer for predicting energy expenditure in a semi-structured environment. Adults (n = 25) aged 18-30 engaged in 14 sedentary, ambulatory, exercise, and lifestyle activities over a 60-min protocol while wearing a portable metabolic analyser, hip-mounted accelerometer, and wireless network of three accelerometers worn on the right wrist, thigh, and ankle. Participants chose the order and duration of activities. Artificial neural networks were created separately for the wireless network and hip accelerometer for energy expenditure prediction. The wireless network had higher correlations (r = 0.79 vs. r = 0.72, P  0.05) to the hip accelerometer. Measured (from metabolic analyser) and predicted energy expenditure from the hip accelerometer were significantly different for the 3 of the 14 activities (lying down, sweeping, and cycle fast); conversely, measured and predicted energy expenditure from the wireless network were not significantly different for any activity. In conclusion, the wireless network yielded a small improvement over the hip accelerometer, providing evidence that the wireless network can produce accurate estimates of energy expenditure in adults participating in a range of activities.

  20. Intelligent Mobility Management Model for Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Sanjeev Prakash

    2015-12-01

    Full Text Available Growing consumer demands for access of communication services in a ubiquitous environment is a driving force behind the development of new technologies. The rapid development in communication technology permits the end users to access heterogeneous wireless networks to utilize the swerve range of data rate service “anywhere any time”. These forces to technology developers to integrate different wireless access technologies which is known as fourth generation (4G. It is become possible to reduce the size of mobile nodes (MNs with manifold network interfaces and development in IP-based applications. 4G mobile/wireless computing and communication heterogeneous environment consist of various access technologies that differ in bandwidth, network conditions, service type, latency and cost. A major challenge of the 4G wireless network is seamless vertical handoff across the heterogeneous wireless access network as the users are roaming in the heterogeneous wireless network environment. Today communication devices are portable and equipped with manifold interfaces and are capable to roam seamlessly among the various access technology networks for maintaining the network connectivity, since no single-interface technology provides ubiquitous coverage and quality-of-service (QoS. This paper reports a mobile agent based heterogeneous wireless network management system. In this system agent’s decision focuses on multi parameter system (MPS. This system works on the parameters- network delay, received signal strength, network latency and study of the collected information about adjoining network cells viz., accessible channel. System is simulated and a comparative study is also made. From results it is observed that system improves the performance of wireless network.