Full Text Available Recently, there is an emerging trend of addressing “energy efficiency” aspect of wireless communications. It has been shown that cooperating users relay each other's information to improve data rates. The energy is limited in the wireless cellular network, but the mobile users refuse to relay. This paper presents an approach that encourages user cooperation in order to improve the energy efficiency. The game theory is an efficient method to solve such conflicts. We present a cellular framework in which two mobile users, who desire to communicate with a common base station, may cooperate via decode-and-forward relaying. In the case of imperfect information assumption, cooperative Nash dynamic game is used between the two users' cooperation to tackle the decision making problems: whether to cooperate and how to cooperate in wireless networks. The scheme based on “cooperative game theory” can achieve general pareto-optimal performance for cooperative games, and thus, maximize the entire system payoff while maintaining fairness.
This brief presents several enhancement modules to Multipath Transmission Control Protocol (MPTCP) in order to support stable and efficient multipath transmission with user cooperation in the Long Term Evolution (LTE) network. The text explains how these enhancements provide a stable aggregate throughput to the upper-layer applications; guarantee a steady goodput, which is the real application-layer perceived throughput; and ensure that the local traffic of the relays is not adversely affected when the relays are forwarding data for the destination. The performance of the proposed solutions is extensively evaluated using various scenarios. The simulation results demonstrate that the proposed modules can achieve a stable aggregate throughput and significantly improve the goodput by 1.5 times on average. The brief also shows that these extensions can well respect the local traffic of the relays and motivate the relay users to provide the relaying service.
In most IT system development processes, the identification or elicitation of user requirements is recognized as a key building block. In practice, the identification of user needs and wants is a challenge and inadequate or faulty identifications in this step of an IT system development can cause...... huge problems with the final product. The elicitation of user requirements as such changes according to age groups;, to gender,; to cultural settings,; and into time; and experience in the use of the system/software. User requirements, therefore, cannot be used between projects, IT systems......, and different software. That makes the elicitation of user requirements an inherent part of any software development project and a resourceful activity as well. This book provides insights to the process of identifying user requirements and to different types by describing varying case studies in which...
In most IT system development processes, the identification or elicitation of user requirements is recognized as a key building block. In practice, the identification of user needs and wants is a challenge and inadequate or faulty identifications in this step of an IT system development can cause...... involvement and requirements elicitation Usable security requirements for design of privacy...
Shafiee, Hamid R; Maham, B; Vazifehdan, J
.... When employing more than one antenna at each node of a wireless network is not applicable, cooperation diversity protocols exploit the inherent spatial diversity of relay channels by allowing mobile...
following a common strategy. Wireless devices share their resources (i.e. radio link, antenna, battery, processing unit, etc.) during cooperation using the short-range technology as the underlying communication platform. The amount of data exchanged over the short-range link diers from application......, quality of service, and so on....... to application. In some situations the short-range communication is not used at all in case all mobile devices have a predefined mutual understanding of their cooperativeness. The main reason of cooperation is threefold: first, the limit capability of wireless devices can be virtually enhanced by cooperation...
Full Text Available Due to the rapid growth of mobile data traffic, more and more basestations and access points (APs have been densely deployed to provide users with ubiquitous network access, which make current wireless network a complex heterogeneous network (HetNet. However, traditional wireless networks are designed with network-centric approaches where different networks have different quality of service (QoS strategies and cannot easily cooperate with each other to serve network users. Massive network infrastructures could not assure users perceived network and service quality, which is an indisputable fact. To address this issue, we design a new framework for heterogeneous wireless networks with the principle of user-centricity, refactoring the network from users’ perspective to suffice their requirements and preferences. Different from network-centric approaches, the proposed framework takes advantage of Software Defined Networking (SDN and virtualization technology, which will bring better perceived services quality for wireless network users. In the proposed user-centric framework, control plane and data plane are decoupled to manage the HetNets in a flexible and coadjutant way, and resource virtualization technology is introduced to abstract physical resources of HetNets into unified virtualized resources. Hence, ubiquitous and undifferentiated network connectivity and QoE (quality of experience driven fine-grained resource management could be achieved for wireless network users.
Full Text Available Introducing cooperation into a wireless sensor network (WSN has gained much attention in the recent few years mainly because of the significant effect it has on optimizing energy consumption and on enhancing the lifetime and the overall performance of the network. Cooperation can be exploited at different levels, ranging from a collection of nodes collaborating to forward the data they gathered from the environment towards the base station through efficient data aggregation and clustering techniques, to nodes collaborating to report events occurrences, track targets or control the topology. Motivated by a large variety of attractive wireless sensor applications, such as environmental monitoring, smart environments and healthcare applications, we survey mechanisms that take advantage of cooperation among sensor nodes in the network for the purpose of delivering information reliably and efficiently to nodes of the network that are interested in receiving it. We provide detailed overviews and highlight the importance of cooperation from different perspectives.
Das, Kallol; Wymeersch, Henk
Cooperative positioning is an emerging topic in wireless sensor networks and navigation. It can improve the positioning accuracy and coverage in GPS-challenged conditions such as inside tunnels, in urban canyons, and indoors. Different algorithms have been proposed relying on iteratively exchanging
This brief focuses on radio resource allocation in a heterogeneous wireless medium. It presents radio resource allocation algorithms with decentralized implementation, which support both single-network and multi-homing services. The brief provides a set of cooperative networking algorithms, which rely on the concepts of short-term call traffic load prediction, network cooperation, convex optimization, and decomposition theory. In the proposed solutions, mobile terminals play an active role in the resource allocation operation, instead of their traditional role as passive service recipients in the networking environment.
Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee
Interference is generally considered as the redundant and unwanted occurrence in wireless communication. This work proposes a novel cooperative jamming mechanism for scalable networks like Wireless Sensor Networks (WSNs) which makes use of friendly interference to confuse the eavesdropper...
Prakash, R; Ganesh, A Balaji; Girish, Siva V
A real-time cooperative communication based wireless network is presented for monitoring health and activity of an end-user in their environment. The cooperative communication offers better energy consumption and also an opportunity to aware the current location of a user non-intrusively. The link between mobile sensor node and relay node is dynamically established by using Received Signal Strength Indicator (RSSI) and Link Quality Indicator (LQI) based on adaptive relay selection scheme. The study proposes a Linear Acceleration based Transmission Power Decision Control (LA-TPDC) algorithm to further enhance the energy efficiency of cooperative communication. Further, the occurrences of false alarms are carefully prevented by introducing three stages of sequential warning system. The real-time experiments are carried-out by using the nodes, namely mobile sensor node, relay nodes and a destination node which are indigenously developed by using a CC430 microcontroller integrated with an in-built transceiver at 868 MHz. The wireless node performance characteristics, such as energy consumption, Signal-Noise ratio (SNR), Bit Error Rate (BER), Packet Delivery Ratio (PDR) and transmission offset are evaluated for all the participated nodes. The experimental results observed that the proposed linear acceleration based transmission power decision control algorithm almost doubles the battery life time than energy efficient conventional cooperative communication.
James Z. Wang
Full Text Available This paper proposes a mobile cache model to facilitate the cooperative proxy caching in wireless base stations. This mobile cache model uses a network cache line to record the caching state information about a web document for effective data search and cache space management. Based on the proposed mobile cache model, a P2P cooperative proxy caching scheme is proposed to use a self-configured and self-managed virtual proxy graph (VPG, independent of the underlying wireless network structure and adaptive to the network and geographic environment changes, to achieve efficient data search, data cache and date replication. Based on demand, the aggregate effect of data caching, searching and replicating actions by individual proxy servers automatically migrates the cached web documents closer to the interested clients. In addition, a cache line migration (CLM strategy is proposed to flow and replicate the heads of network cache lines of web documents associated with a moving mobile host to the new base station during the mobile host handoff. These replicated cache line heads provide direct links to the cached web documents accessed by the moving mobile hosts in the previous base station, thus improving the mobile web caching performance. Performance studies have shown that the proposed P2P cooperative proxy caching schemes significantly outperform existing caching schemes.
Fitzek, Frank HP
Covers the underlying principles of cooperative techniques as well as several applications demonstrating the use of such techniques in practical systems. This book also summarizes the strength of cooperation for wireless communication systems, motivating the use of cooperative techniques.
Pop, Paul; Scholle, Detlef; Sljivo, Irfan
detection of abnormal behaviour, triggering if needed a safe degraded mode. SafeCOP will also develop methods and tools, which will be used to produce safety assurance evidence needed to certify cooperative functions. SafeCOP will extend current wireless technologies to ensure safe and secure cooperation......This paper presents an overview of the ECSEL project entitled ―Safe Cooperating Cyber-Physical Systems using Wireless Communication‖ (SafeCOP), which runs during the period 2016–2019. SafeCOP targets safety-related Cooperating Cyber-Physical Systems (CO-CPS) characterised by use of wireless...
Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee
in the mobile equipment is not feasible due to resource constraints. Cooperative wireless communication (CWC) is the upcoming virtual MIMO technique to combat fading and achieve diversity through user cooperation. Physical layer security (PLS) is the imminent security guarantee for the cooperative communication....... was present there started shouting ”stop, stop the bus”. And the sound finally reached the bus driver and he stopped the bus and the employee could catch it in time. This analogy from everyday realistic life simply depicts the spirit of cooperative wireless communication which utilizes the information...... overheard by neighbouring nodes to offer reliable communication between sender and receiver. The future converged wireless networks are expected to provide high data rate services with extension in coverage area. Also, the next generation networks should possess bandwidth efficiency, less power consumption...
Song, Wei; Jin, A-Long
This book focuses on the design and analysis of protocols for cooperative wireless networks, especially at the medium access control (MAC) layer and for crosslayer design between the MAC layer and the physical layer. It highlights two main points that are often neglected in other books: energy-efficiency and spatial random distribution of wireless devices. Effective methods in stochastic geometry for the design and analysis of wireless networks are also explored. After providing a comprehensive review of existing studies in the literature, the authors point out the challenges that are worth further investigation. Then, they introduce several novel solutions for cooperative wireless network protocols that reduce energy consumption and address spatial random distribution of wireless nodes. For each solution, the book offers a clear system model and problem formulation, details of the proposed cooperative schemes, comprehensive performance analysis, and extensive numerical and simulation results that validate th...
ISLAM, M. R.; KIM, J.
An energy efficient cooperative technique is proposed for the IEEE 1451 based Wireless Sensor Networks. Selected numbers of Wireless Transducer Interface Modules (WTIMs) are used to form a Multiple Input Single Output (MISO) structure wirelessly connected with a Network Capable Application Processor (NCAP). Energy efficiency and delay of the proposed architecture are derived for different combination of cluster size and selected number of WTIMs. Optimized constellation parameters are used for...
Zhu, Kaiyan; Wang, Fei; Li, Songsong; Jiang, Fengjiao; Cao, Lijie
Energy harvesting from the surroundings is a promising solution to provide energy supply and extend the life of wireless sensor networks. Recently, energy harvesting has been shown as an attractive solution to prolong the operation of cooperative networks. In this paper, we propose a relay selection scheme to optimize the amplify-and-forward (AF) cooperative transmission in wireless energy harvesting cooperative networks. The harvesting energy and channel conditions are considered to select the optimal relay as cooperative relay to minimize the outage probability of the system. Simulation results show that our proposed relay selection scheme achieves better outage performance than other strategies.
Kim, Dong Min; Thomsen, Henning; Popovski, Petar
In this paper, we describe CoMP2flex, a user-centric base station (BS) cooperation scheme that provides improvements in reliability of both uplink (UL) and downlink (DL) communications of wireless cellular networks. CoMP2flex supports not only cooperation of two BSs with same direction of traffic...
In this thesis, the RF energy harvesting technique is studied in the cooperative wireless network, and different optimization studies are investigated. First, an energy-efficient optimization is considered in the cooperative system with the time switching relaying and power splitting relaying protocols. Then, a security issue in the cooperative network with energy harvesting is proposed, in which the optimization problem is designed to maximize the secrecy rate. We also consider the applicati...
TANGTRONGBENCHASIL, Charoen; HAMADA, Yoichi; KATO, Toshihiro; NONAKA, Koji
Optical wireless communications is a research topic of extreme interest since it offers high data rate (Gbps data rate), security, and RF interference immunity. However, optical wireless communications places severe restrictions on the communications paths; they must be direct beam connections. To increase the number of users and link robustness, optical wireless communications must be able to operate even when obstacles are placed between transmitters and receivers, so optical micro-cell (OM...
Ng, See-Kee; Seah, Winston K G
Traditional networks are built on the assumption that network entities cooperate based on a mandatory network communication semantic to achieve desirable qualities such as efficiency and scalability. Over the years, this assumption has been eroded by the emergence of users that alter network behavior in a way to benefit themselves at the expense of others. At one extreme, a malicious user/node may eavesdrop on sensitive data or deliberately inject packets into the network to disrupt network operations. The solution to this generally lies in encryption and authentication. In contrast, a rational node acts only to achieve an outcome that he desires most. In such a case, cooperation is still achievable if the outcome is to the best interest of the node. The node misbehavior problem would be more pronounced in multihop wireless networks like mobile ad hoc and sensor networks, which are typically made up of wireless battery-powered devices that must cooperate to forward packets for one another. However, cooperation may be hard to maintain as it consumes scarce resources such as bandwidth, computational power, and battery power. This paper applies game theory to achieve collusive networking behavior in such network environments. In this paper, pricing, promiscuous listening, and mass punishments are avoided altogether. Our model builds on recent work in the field of Economics on the theory of imperfect private monitoring for the dynamic Bertrand oligopoly, and adapts it to the wireless multihop network. The model derives conditions for collusive packet forwarding, truthful routing broadcasts, and packet acknowledgments under a lossy wireless multihop environment, thus capturing many important characteristics of the network layer and link layer in one integrated analysis that has not been achieved previously. We also provide a proof of the viability of the model under a theoretical wireless environment. Finally, we show how the model can be applied to design a generic
Olsen, Anders Brødløs; Fitzek, Frank H. P.; Koch, Peter
the unreliable wireless link. Principles of multi–processor energy aware task scheduling are used exploiting performance scalable technologies such as Dynamic Voltage Scaling (DVS). We introduce a novel mechanism referred to as D2VS and here it is shown by means of simulation that savings of 40% can be achieved....
Liu, Chunling; Mou, Yangyang; Pan, Chengsheng
As an important part of resource allocation, power allocation affects the performance of wireless cooperative system to a great extent. However, the existing cooperative communication power allocation scheme using only a single index to optimize the performance of the system makes the optimization effect unideal, put forward a cooperative communication power allocation scheme comprehensively consider of the capacity and error probability as objective function. In this paper, the capacity and error probability of the cooperative communication technology are analyzed and the corresponding theoretical formulas are derived, then prove the nonlinear relationship between the two. On this basis, make the maximizing the capacity and minimizing error probability as objective function, present the power allocation scheme based on particle swarm optimization. The simulation results show that the proposed scheme has better effect on cooperative communication system, and is more suitable for the future development of cooperative communication technology.
Topic: Using a qualitative methodology, this study attempts to provide a general framework of the functions of mobile communication, and to identify the specific preferences of mobile phone users regarding the commercial messages received on their personal devices. Research objectives: (1) To identify the specific characteristics of mobile communication as perceived by mobile users; (2) to define and analyze the functions of wireless communication as perceived by mobile phone users; and (3) t...
Tao, Ming; Yuan, Huaqiang; Wei, Wenhong; Qu, Chao
Addressing the energy efficiency in data-centric and application-oriented wireless sensor networks is an eternal theme, and in the practical scenarios deployed multiple flows, often a serious problem of collisions among multiple paths caused by the fierce network resource competition directly influences the whole network performance. To address this issue, in terms of the delay sensitivity imposed on the deployed flows, a feature-aware cooperative relay selection scheme is developed by compre...
Hu, Liang; Dittmann, Lars; Le Boudec, J-Y
are challenging due to the lack of global podcast channel popularity information at each individual node. We design a distributed reputation system at each node for estimating the global channel popularity information which is significant for forwarding and cache management decision. Our simulation result shows......The user-generated podcasting service over mobile opportunistic networks can facilitate the user generated content dissemination while humans are on the move. However, in such a distributed and dynamic network environment, the design of efficient content forwarding and cache management schemes...... that, compare to history-based rank scheme, our reputation system can significantly improve system performance under community-based random way-point (C-RWP) mobility model and localized channel popularity distribution....
Full Text Available In recent years, wireless sensor networks (WSNs have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any loopholes in their security, which might open the door for an attacker and hence, endanger the application. User authentication is one of the most important security services to protect WSN data access from unauthorized users; it should provide both mutual authentication and session key establishment services. This paper proposes a robust user authentication framework for wireless sensor networks, based on a two-factor (password and smart card concept. This scheme facilitates many services to the users such as user anonymity, mutual authentication, secure session key establishment and it allows users to choose/update their password regularly, whenever needed. Furthermore, we have provided the formal verification using Rubin logic and compare RUASN with many existing schemes. As a result, we found that the proposed scheme possesses many advantages against popular attacks, and achieves better efficiency at low computation cost.
Kristensen, Jesper Michael; Fitzek, Frank H. P.; Koch, Peter
This paper motivates the application of Software defined radio as the enabling technology in the implementation of future wireless terminals for 4G. It outlines the advantages and disadvantages of SDR in terms of Flexibility and reconfigurability versus computational complexity. To mitigate...... the expected increase in complexity leading to a decrease in energy efficiency, cooperative wireless networks are introduced. Cooperative wireless networks enables the concept of resource sharing. Resource sharing is interpreted as collaborative signal processing. This interpretation leads to the concept...
Pedersen, Morten Videbæk
the initial development of systems and protocols and show that the potential is there. However, I also find that network coding needs to be implemented with care and protocols have to be designed with consideration to make use of this novel technique. 2) The final aspect of this PhD investigates different...... ways that cooperative models may be implemented to cover a wide range of applications. This addresses the development of user cooperative protocols and how we in Device To Device (D2D) communication may reward users that contribute more to the network than they gain. In this area I suggest the use...... of social-networks to allow payoff in different domains. In the future this work could be expanded and built into cooperative protocols. v...
Thai, Chan; Popovski, Petar
The area of wireless cooperation/relaying has recently been significantly enriched by the ideas of wireless network coding (NC), which bring substantial gains in spectral efficiency. These gains have mainly been demonstrated in scenarios with two-way relaying. Inspired by the ideas of wireless NC...
Full Text Available Since the issues of low communication bandwidth supply and limited battery capacity are very crucial for wireless sensor networks, this paper focuses on the problem of event-triggered cooperative target tracking based on set-membership information filtering. We study some fundamental properties of the set-membership information filter with multiple sensor measurements. First, a sufficient condition is derived for the set-membership information filter, under which the boundedness of the outer ellipsoidal approximation set of the estimation means is guaranteed. Second, the equivalence property between the parallel and sequential versions of the set-membership information filter is presented. Finally, the results are applied to a 1D event-triggered target tracking scenario in which the negative information is exploited in the sense that the measurements that do not satisfy the triggering conditions are modelled as set-membership measurements. The tracking performance of the proposed method is validated with extensive Monte Carlo simulations.
Paczesny, Tomasz; Paczesny, Daniel; Weremczuk, Jerzy
Wireless Sensor Networks (WSN) are currently very popular area of development. It can be suited in many applications form military through environment monitoring, healthcare, home automation and others. Those networks, when working in dynamic, ad-hoc model, need effective protocols which must differ from common computer networks algorithms. Research on those protocols would be difficult without simulation tool, because real applications often use many nodes and tests on such a big networks take much effort and costs. The paper presents Graphical User Interface (GUI) for simulator which is dedicated for WSN studies, especially in routing and data link protocols evaluation.
Dung T. Tran
Full Text Available Choosing routes such that the network lifetime is maximized in a wireless network with limited energy resources is a major routing problem in wireless multi-hop ad hoc networks. In this paper, we study the problem where participants are rationally selfish and non-cooperative. By selfish we designate the users who are ready to tamper with their source-routing (senders could choose intermediate nodes in the routing paths or next hop selection strategies in order to increase the total number of packets transmitted, but do not try to harm or drop packets of the other nodes. The problem therefore amounts to a non-cooperative game. In the works [2,6,19,23], the authors show that the game admits Nash equilibria . Along this line, we first show that if the cost function is linear, this game has pure-strategy equilibrium flow even though participants have different demands. However, finding a Nash equilibrium for a normal game is computationally hard . In this work, inspired by mixed-strategy equilibrium, we propose a simple local routing algorithm called MIxed Path Routing protocol (MiPR. Using analysis and simulations, we show that MiPR drives the system to an equilibrium state where selfish participants do not have incentive to deviate. Moreover, MiPR significantly improves the network lifetime as compared to original routing protocols.
Full Text Available Topic: Using a qualitative methodology, this study attempts to provide a general framework of the functions of mobile communication, and to identify the specific preferences of mobile phone users regarding the commercial messages received on their personal devices. Research objectives: (1 To identify the specific characteristics of mobile communication as perceived by mobile users; (2 to define and analyze the functions of wireless communication as perceived by mobile phone users; and (3 to investigate users preference regarding the content of commercial wireless communication. Previous research: Bauer et al. (2002 identified time, location, information and personalization as relevant acceptance factors for mobile advertising. Barwise and Strong (2002 developed a conceptual model, arguing that social norms, user's motives, mode, time, location and personal characteristics will affect the processing of mobile information by consumers. Tsang et al. (2004 evidenced the influence of entertainment, informativeness and irritation, while Bauer et al. (2005 argued that consumer attitudes are influenced by perceived information, entertainment, and social utility. In a similar study, Xu and Gutierrez (2006 tested the effect of entertainment, irritation, informativeness, credibility and personalization on the attitudes of Chinese consumers. Research methodology: First, a series of academic and practical articles and reports have been accessed in order to assess the existing knowledge on this topic. Second, five focus groups have been organized with six mobile phone users, aged between 20 and 40 years old. Each focus group comprised an equal number of male and female participants. The focus groups lasted between 45 and 60 minutes and addressed three main issues: the specific characteristics of the mobile phones as a commercial communication media, the functions of mobile phone communication, and the specific preferences of mobile phones users regarding the
Full Text Available Nowadays, several wireless location systems have been developed in the research world. The goal of these systems has always been to find the greatest accuracy as possible. However, if every node takes data from the environment, we can gather a lot of information, which may help us understand what is happening around our network in a cooperative way. In order to develop this cooperative location and tracking system, we have implemented a sensor network to capture data from user devices. From this captured data we have observed a symmetry behavior in people’s movements at a specific site. By using these data and the symmetry feature, we have developed a statistical cooperative approach to predict the new user’s location. The system has been tested in a real environment, evaluating the next location predicted by the system and comparing it with the next location in the real track, thus getting satisfactory results. Better results have been obtained when the stochastic cooperative approach uses the transition matrix with symmetry.
Zhang, Zufan; Wang, Lu; Zhang, Jie
The Device-to-Device (D2D) communication system is an important part of heterogeneous networks. It has great potential to improve spectrum efficiency, throughput and energy efficiency cooperation of multiple D2D users with the advantage of direct communication. When cooperating, D2D users expend extraordinary energy to relay data to other D2D users. Hence, the remaining energy of D2D users determines the life of the system. This paper proposes a cooperation scheme for multiple D2D users who reuse the orthogonal spectrum and are interested in the same data by aiming to solve the energy problem of D2D users. Considering both energy availability and the Signal to Noise Ratio (SNR) of each D2D user, the Kuhn-Munkres algorithm is introduced in the cooperation scheme to solve relay selection problems. Thus, the cooperation issue is transformed into a maximum weighted matching (MWM) problem. In order to enhance energy efficiency without the deterioration of Quality of Service (QoS), the link outage probability is derived according to the Shannon Equation by considering the data rate and delay. The simulation studies the relationships among the number of cooperative users, the length of shared data, the number of data packets and energy efficiency.
Ahmed, Qasim Zeeshan
This paper investigates and compares the performance of wireless sensor networks (WSN) when sensors operate on the principles of cooperative communications. We consider a scenario where the source transmits signals to the destination with the help of L sensors. As the destination has the capacity of processing only U out of these L signals, U strongest signals are selected while the remaining (L - U) signals are suppressed. A preprocessing block similar to channel-shortening (CS) is proposed in this contribution. However, this preprocessing block employs rank-reduction technique instead of CS. This detector operates on the principles of principal components (PC). From our simulations it can be observed that this detector is capable of achieving a similar bit error rate (BER) performance as the full-rank MMSE detector with significantly lower complexity. It outperforms the CS-based detector in terms of BER performance when using fixed amplification factor. However, for variable gain amplification factor a tradeoff between the diversity gain and the receiver complexity can be observed. From the simulations it can be concluded that the BER performance of the PC-based detector when using variable gain amplification factor are better than that of the CS-based detector for lower signal to noise ratio. © 2012 IEEE.
Williams, A.D.; Vuurpijl, Louis; Schomaker, Lambert; van den Broek, Egon
In this paper, the image retrieval system Vind(x) is described. The architecture of the system and first user experiences are reported. Using Vind(x), users on the Internet may cooperatively annotate objects in paintings by use of the pen or mouse. The collected data can be searched through
Pop, Paul; Scholle, Detlef; Hansson, Hans
communication, multiple stakeholders, dynamic system definitions (openness), and unpredictable operating environments. SafeCOP will provide an approach to the safety assurance of CO-CPS, enabling thus their certification and development. The project will define a runtime manager architecture for runtime...... detection of abnormal behaviour, triggering if needed a safe degraded mode. SafeCOP will also develop methods and tools, which will be used to produce safety assurance evidence needed to certify cooperative functions. SafeCOP will extend current wireless technologies to ensure safe and secure cooperation......This paper presents an overview of the ECSEL project entitled "Safe Cooperating Cyber-Physical Systems using Wireless Communication" (SafeCOP), which runs during the period 2016 -- 2019. SafeCOP targets safety-related Cooperating Cyber-Physical Systems (CO-CPS) characterised by use of wireless...
Han, Changcai; Yang, Jinsheng
The multi-source cooperation integrating distributed low-density parity-check codes is investigated to jointly collect data from multiple sensor nodes to the mobile sink in the wireless sensor network. The one-round and two-round cooperative data collection schemes are proposed according to the moving trajectories of the sink node. Specifically, two sparse cooperation models are firstly formed based on geographical locations of sensor source nodes, the impairment of inter-node wireless channels and moving trajectories of the mobile sink. Then, distributed low-density parity-check codes are devised to match the directed graphs and cooperation matrices related with the cooperation models. In the proposed schemes, each source node has quite low complexity attributed to the sparse cooperation and the distributed processing. Simulation results reveal that the proposed cooperative data collection schemes obtain significant bit error rate performance and the two-round cooperation exhibits better performance compared with the one-round scheme. The performance can be further improved when more source nodes participate in the sparse cooperation. For the two-round data collection schemes, the performance is evaluated for the wireless sensor networks with different moving trajectories and the variant data sizes.
ar X iv :1 60 1. 00 37 4v 1 [ cs .I T ] 4 J an 2 01 6 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 34, NO. X, JAN. 2016 1 Wireless ... wireless - powered multi-relay cooperative networks in this paper. Dif- ferent from the conventional battery-free PS relaying strategy, harvested...operations including the charging and discharging. To this end, PS and battery operations are coupled with distributed beamforming. A throughput
Varga, C; Blazovics, L; Charaf, H
Social networks and mobile systems are both rapidly developing areas nowadays. In this chapter, we will introduce Gedda-Headz, a novel social mobile gaming concept that brings these two areas together. Gedda-Headz is a social mobile network that mainly focuses on multiplayer mobile gaming. First we...... will thoroughly discuss how users may cooperate with each other in Gedda-Headz, as cooperation is very important in a mobile environment. Among other benefits, it may help users to use services that would otherwise be unreachable for them, or greatly decrease the energy cost of certain activities. Finally...
Williams, A.D.; Vuurpijl, Louis; Schomaker, Lambert; van den Broek, Egon
In this paper, the image retrieval system Vind(x) is described. The architecture of the system and first user experiences are reported. Using Vind(x), users on the Internet may cooperatively annotate objects in paintings by use of the pen or mouse. The collected data can be searched through query-by-drawing techniques, but can also serve as an (ever-growing) training and benchmark set for the development of automated image retrieval systems of the future. Several other examples of cooperative...
Full Text Available In this paper, we investigate the secure transmission in wireless sensor networks (WSNs consisting of one multiple-antenna base station (BS, multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative jammer. In an effort to reduce the scheduling complexity and extend the battery lifetime of the sensor nodes, the switch-and-stay combining (SSC scheduling scheme is exploited over the sensor nodes. Meanwhile, transmit antenna selection (TAS is employed at the BS and cooperative jamming (CJ is adopted at the jammer node, aiming at achieving a satisfactory secrecy performance. Moreover, depending on whether the jammer node has the global channel state information (CSI of both the legitimate channel and the eavesdropper’s channel, it explores a zero-forcing beamforming (ZFB scheme or a null-space artificial noise (NAN scheme to confound the eavesdropper while avoiding the interference to the legitimate user. Building on this, we propose two novel hybrid secure transmission schemes, termed TAS-SSC-ZFB and TAS-SSC-NAN, for WSNs. We then derive the exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput of both schemes to characterize the secrecy performance. Using these closed-form expressions, we further determine the optimal switching threshold and obtain the optimal power allocation factor between the BS and jammer node for both schemes to minimize the secrecy outage probability, while the optimal secrecy rate is decided to maximize the effective secrecy throughput for both schemes. Numerical results are provided to verify the theoretical analysis and illustrate the impact of key system parameters on the secrecy performance.
Scholliers, J.; Sambeek, M. van; Moerman, K.
Introduction: This paper describes the development of an architecture for the integration of Vulnerable Road Users (VRUs), i.e. pedestrians, cyclists and powered two-wheelers (PTWs) in Cooperative ITS (C-ITS) systems, and the requirements for VRU devices. Methods: This paper starts with a literature
Perrucci, Gian Paolo; Anggraeni, Puri Novelti; Wardana, Satya Ardhy
In this work, bio-inspired cooperation rules are applied to wireless communication networks. The main goal is to derive cooperative behaviour rules to improve the energy consumption of each mobile device. A medium access control (MAC) protocol particularly designed for peer-to-peer communication...... among cooperative wireless mobile devices is described. The work is based on a novel communication architecture, where a group of mobile devices are connected both to a cellular base station and among them using short-range communication links. A prior work has investigated the energy saving that can...... be achieved by this architecture using game theoretic approaches. As an extension, this work explores the impact of the MAC protocol on the power saving capabilities. This result shows that standard MAC mechanisms are not optimised for the considered cooperative setup. A new MAC protocol is proposed...
Full Text Available We proposed a multiple relay selection protocol for decentralized wireless networks. The proposed relays selection protocol aims to address three issues: (1 selecting relays within the coverage area of the source and destination to ensure that the relays are positioned one hop away from the destination, (2 ensuring that the best node (best relays with less distance and attenuation from the destination access the channel first, and (3 ensuring that the proposed relays selection is collision-free. Our analysis also considers three important characteristics of decentralized wireless networks that are directly affected by cooperation: delay, connectivity, and throughput. The main goal of this paper is to demonstrate that improving connectivity and increasing number of relays reduce the throughput of cooperative decentralized wireless networks; consequently, a trade-off equation has been derived.
Zhang, Qi; Fitzek, Frank H.P.; Iversen, Villy Bæk
a cooperative cluster using their short-range air interface and one device contends the channel for all the devices within the cluster. This strategy reduces the number of mobile devices involved in the collision process for the wireless medium resulting in larger throughput, smaller access delay, and less...
Full Text Available Wireless sensor networks are widely used in industrial process control, human health care, environmental control, vehicular tracking and battlefield surveillance, etc. A wireless sensor network consists of lots of sensor nodes and a gateway node. The sensor node usually communicates with the gateway node and users over an ad hoc wireless network. However, due to the open environments, the wireless sensor networks are vulnerable to variety of security threats. Thus, it is a critical issue to adopt a suitable authentication mechanism for wireless sensor networks to enhance security. In 2009, Vaidya et al. proposed a robust user authentication schemes for wireless sensor networks. In this article, we will show that their scheme is vulnerable to the guessing attack and the impersonation attack. Since it needs a secure channel for communications in password changing phase, their scheme is also inconvenient and expensive for users to update passwords. We also propose an improved scheme to remedy the flaws. The improved scheme withstands the replay attack and off-line guessing attack, and the users can freely update their passwords via public channels.
Full Text Available We study simultaneous wireless information and power transfer (SWIPT in multihop wireless cooperative networks, where the multihop capability that denotes the largest number of transmission hops is investigated. By utilizing the broadcast nature of multihop wireless networks, we first propose a cooperative forwarding power (CFP scheme. In CFP scheme, the multiple relays and receiver have distinctly different tasks. Specifically, multiple relays close to the transmitter harvest power from the transmitter first and then cooperatively forward the power (not the information towards the receiver. The receiver receives the information (not the power from the transmitter first, and then it harvests the power from the relays and is taken as the transmitter of the next hop. Furthermore, for performance comparison, we suggest two schemes: cooperative forwarding information and power (CFIP and direct receiving information and power (DFIP. Also, we construct an analysis model to investigate the multihop capabilities of CFP, CFIP, and DFIP schemes under the given targeted throughput requirement. Finally, simulation results validate the analysis model and show that the multihop capability of CFP is better than CFIP and DFIP, and for improving the multihop capabilities, it is best effective to increase the average number of relay nodes in cooperative set.
Lu, Chenguang; Fitzek, Frank; Eggers, Patrick Claus F.
We present a cooperative spatial reuse (CSR) scheme as a cooperative extension of the current TDMA-based MAC to enable spatial reuse in multi-rate wireless networks. We model spatial reuse as a cooperation problem on utilizing the time slots obtained from the TDMA-based MAC. In CSR, there are two......-based MAC using maximum ratio combining (MRC) transmit beamforming, namely MRC-TDMA. The numerical results of a simulated two 2 × 1 MISO links scenario show the great potential of CSR to substantially increase the capacity and energy efficiency. Udgivelsesdato: Feb. 2009...
Islam, Mohammad Rakibul; Han, Young Shin
Cooperative communication in wireless sensor network (WSN) explores the energy efficient wireless communication schemes between multiple sensors and data gathering node (DGN) by exploiting multiple input multiple output (MIMO) and multiple input single output (MISO) configurations. In this paper, an energy efficient cooperative MIMO (C-MIMO) technique is proposed where low density parity check (LDPC) code is used as an error correcting code. The rate of LDPC code is varied by varying the length of message and parity bits. Simulation results show that the cooperative communication scheme outperforms SISO scheme in the presence of LDPC code. LDPC codes with different code rates are compared using bit error rate (BER) analysis. BER is also analyzed under different Nakagami fading scenario. Energy efficiencies are compared for different targeted probability of bit error pb. It is observed that C-MIMO performs more efficiently when the targeted pb is smaller. Also the lower encoding rate for LDPC code offers better error characteristics. PMID:22163732
Full Text Available The persistent relay carrier sensing multiple access (PRCSMA protocol is presented in this paper as a novel medium access control (MAC protocol that allows for the execution of a distributed cooperative automatic retransmission request (ARQ scheme in IEEE 802.11 wireless networks. The underlying idea of the PRCSMA protocol is to modify the basic rules of the IEEE 802.11 MAC protocol to execute a distributed cooperative ARQ scheme in wireless networks in order to enhance their performance and to extend coverage. A closed formulation of the distributed cooperative ARQ average packet transmission delay in a saturated network is derived in the paper. The analytical equations are then used to evaluate the performance of the protocol under different network configurations. Both the accuracy of the analysis and the performance evaluation of the protocol are supported and validated through computer simulations.
Full Text Available Reliability is a key factor for application-oriented Underwater Sensor Networks (UWSNs which are utilized for gaining certain objectives and a demand always exists for efficient data routing mechanisms. Cooperative routing is a promising technique which utilizes the broadcast feature of wireless medium and forwards data with cooperation using sensor nodes as relays. Here, we present a cooperation-based routing protocol for underwater networks to enhance their performance called Stochastic Performance Analysis with Reliability and Cooperation (SPARCO. Cooperative communication is explored in order to design an energy-efficient routing scheme for UWSNs. Each node of the network is assumed to be consisting of a single omnidirectional antenna and multiple nodes cooperatively forward their transmissions taking advantage of spatial diversity to reduce energy consumption. Both multihop and single-hop schemes are exploited which contribute to lowering of path-losses present in the channels connecting nodes and forwarding of data. Simulations demonstrate that SPARCO protocol functions better regarding end-to-end delay, network lifetime, and energy consumption comparative to noncooperative routing protocol—improved Adaptive Mobility of Courier nodes in Threshold-optimized Depth-based routing (iAMCTD. The performance is also compared with three cooperation-based routing protocols for UWSN: Cognitive Cooperation (Cog-Coop, Cooperative Depth-Based Routing (CoDBR, and Cooperative Partner Node Selection Criteria for Cooperative Routing (Coop Re and dth.
Das, Kallol; Wymeersch, Henk
Cooperative positioning is a promising solution for location-enabled technologies in GPS-challenged environments. However, it suffers from high computational complexity and increased network traffic, compared to traditional positioning approaches. The computational complexity is related to the
Liu, Shanzhi; Liu, Kai; Wang, Rui; Fang, Ruochen; Liu, Feng
To solve performance degradation caused by channel fading, we propose a cooperative MAC protocol with error-aware relay selection for wireless ad hoc networks in this paper. In the protocol, the transmission error of data packet caused by channel fading are considered in order to achieve the best cooperative gain in the poor quality channel. In the relay selection process, potential relay nodes satisfying corresponding requirement can compete to sever as final relay node by means of priority selection and collision resolution process. Finally, simulation results show that the proposed protocol outperforms other protocol in terms of packet error rate and the saturation throughput.
Nasim, Mehwish; Qaisar, Saad; Lee, Sungyoung
In this work, we present an energy efficient hierarchical cooperative clustering scheme for wireless sensor networks. Communication cost is a crucial factor in depleting the energy of sensor nodes. In the proposed scheme, nodes cooperate to form clusters at each level of network hierarchy ensuring maximal coverage and minimal energy expenditure with relatively uniform distribution of load within the network. Performance is enhanced by cooperative multiple-input multiple-output (MIMO) communication ensuring energy efficiency for WSN deployments over large geographical areas. We test our scheme using TOSSIM and compare the proposed scheme with cooperative multiple-input multiple-output (CMIMO) clustering scheme and traditional multihop Single-Input-Single-Output (SISO) routing approach. Performance is evaluated on the basis of number of clusters, number of hops, energy consumption and network lifetime. Experimental results show significant energy conservation and increase in network lifetime as compared to existing schemes.
Full Text Available In this work, we present an energy efficient hierarchical cooperative clustering scheme for wireless sensor networks. Communication cost is a crucial factor in depleting the energy of sensor nodes. In the proposed scheme, nodes cooperate to form clusters at each level of network hierarchy ensuring maximal coverage and minimal energy expenditure with relatively uniform distribution of load within the network. Performance is enhanced by cooperative multiple-input multiple-output (MIMO communication ensuring energy efficiency for WSN deployments over large geographical areas. We test our scheme using TOSSIM and compare the proposed scheme with cooperative multiple-input multiple-output (CMIMO clustering scheme and traditional multihop Single-Input-Single-Output (SISO routing approach. Performance is evaluated on the basis of number of clusters, number of hops, energy consumption and network lifetime. Experimental results show significant energy conservation and increase in network lifetime as compared to existing schemes.
Taft, Cyrus W. [Taft Engineering, Inc.; Manges, Wayne W [ORNL; Sorge, John N [Southern Company Services, Inc.
The role of wireless sensing technologies in industrial instrumentation will undoubtedly become more important in the years ahead. . Deployment of such instrumentation in an industrial setting with its heightened security and robustness criteria hinges on user acceptance of verified performance as well as meeting cost requirements. Today, industrial users face many choices when specifying a wireless sensor network, including radio performance, battery life, interoperability, security, and standards compliance. The potential market for industrial wireless sensors is literally millions of wireless instruments and it is imperative that accurate information for applying the technology to real-world applications be available to the end-user so that they can make informed deployment decisions. The majority of industrial wireless automation designs now being deployed or being considered for deployment are based on three different standards . The HART Communications Foundation s WirelessHART (IEC 62591), the International Society of Automation s ISA100.11a, and the offering from the Industrial Wireless Alliance of China known as WIA-PA (IEC 62601). Aside from these industrial automation standards, users must also be cognizant of the underlying wireless network standards IEEE 802.11, IEEE 802.15.4, and IEEE 802.15.3a and their interactions with the three principal industrial automation protocols mentioned previously. The crucial questions being asked by end users revolve around sensor network performance, interoperability, reliability, and security. This paper will discuss potential wireless sensor applications in power plants, barriers to the acceptance of wireless technology, concerns related to standards, and provide an end user prospective on the issues affecting wide-spread deployment of wireless sensors. Finally, the authors conclude with a discussion of a recommended path forward including how standards organizations can better facilitate end user decision making and
Nguyen, Hung Tuan
In this paper, with the purpose of further reducing the complexity of the system, while keeping its temporal and spatial focusing performance, we investigate the possibility of using optimal one bit time reversal (TR) system for impulse radio ultra wideband multi-user wireless communications...
Schou, Saowanee; Olesen, Henning
of a Mobile IPv6 device can be determined by mapping the geographical location information with the two care-of-addresses and the physical address of the access point where the user is connected. Such a mechanism makes location services for mobile entities available on a global IP network. The end-users can...
Full Text Available Multi-Input Multi-Output (MIMO techniques can be used to increase the data rate for a given bit error rate (BER and transmission power. Due to the small form factor, energy and processing constraints of wireless sensor nodes, a cooperative Virtual MIMO as opposed to True MIMO system architecture is considered more feasible for wireless sensor network (WSN applications. Virtual MIMO with Vertical-Bell Labs Layered Space-Time (V-BLAST multiplexing architecture has been recently established to enhance WSN performance. In this paper, we further investigate the impact of different modulation techniques, and analyze for the first time, the performance of a cooperative Virtual MIMO system based on V-BLAST architecture with multi-carrier modulation techniques. Through analytical models and simulations using real hardware and environment settings, both communication and processing energy consumptions, BER, spectral efficiency, and total time delay of multiple cooperative nodes each with single antenna are evaluated. The results show that cooperative Virtual-MIMO with Binary Phase Shift Keying-Wavelet based Orthogonal Frequency Division Multiplexing (BPSK-WOFDM modulation is a promising solution for future high data-rate and energy-efficient WSNs.
Ball, David; Kliese, Russell; Windels, Francois; Nolan, Christopher; Stratton, Peter; Sah, Pankaj; Wiles, Janet
This paper describes the design and implementation of a wireless neural telemetry system that enables new experimental paradigms, such as neural recordings during rodent navigation in large outdoor environments. RoSco, short for Rodent Scope, is a small lightweight user-configurable module suitable for digital wireless recording from freely behaving small animals. Due to the digital transmission technology, RoSco has advantages over most other wireless modules of noise immunity and online user-configurable settings. RoSco digitally transmits entire neural waveforms for 14 of 16 channels at 20 kHz with 8-bit encoding which are streamed to the PC as standard USB audio packets. Up to 31 RoSco wireless modules can coexist in the same environment on non-overlapping independent channels. The design has spatial diversity reception via two antennas, which makes wireless communication resilient to fading and obstacles. In comparison with most existing wireless systems, this system has online user-selectable independent gain control of each channel in 8 factors from 500 to 32,000 times, two selectable ground references from a subset of channels, selectable channel grounding to disable noisy electrodes, and selectable bandwidth suitable for action potentials (300 Hz-3 kHz) and low frequency field potentials (4 Hz-3 kHz). Indoor and outdoor recordings taken from freely behaving rodents are shown to be comparable to a commercial wired system in sorting for neural populations. The module has low input referred noise, battery life of 1.5 hours and transmission losses of 0.1% up to a range of 10 m.
Gomez, Enrique J.; Quiles, Jose A.; Sanz, Marcos F.; del Pozo, Francisco
Presents a cooperative information system for remote medical imaging diagnosis. General computer-supported cooperative work (CSCW) problems addressed are definition of a procedure for the design of user-centered cooperative systems (conceptual level); and improvement of user feedback and optimization of the communication bandwidth in highly…
Prakash, R; Balaji Ganesh, A; Sivabalan, Somu
The paper presents a network coded cooperative communication (NC-CC) enabled wireless hospital sensor network architecture for monitoring health as well as postural activities of a patient. A wearable device, referred as a smartband is interfaced with pulse rate, body temperature sensors and an accelerometer along with wireless protocol services, such as Bluetooth and Radio-Frequency transceiver and Wi-Fi. The energy efficiency of wearable device is improved by embedding a linear acceleration based transmission duty cycling algorithm (NC-DRDC). The real-time demonstration is carried-out in a hospital environment to evaluate the performance characteristics, such as power spectral density, energy consumption, signal to noise ratio, packet delivery ratio and transmission offset. The resource sharing and energy efficiency features of network coding technique are improved by proposing an algorithm referred as network coding based dynamic retransmit/rebroadcast decision control (LA-TDC). From the experimental results, it is observed that the proposed LA-TDC algorithm reduces network traffic and end-to-end delay by an average of 27.8% and 21.6%, respectively than traditional network coded wireless transmission. The wireless architecture is deployed in a hospital environment and results are then successfully validated.
Maalej, Mohamed; Cherif, Sofiane; Besbes, Hichem
Wireless sensor networks (WSN) are presented as proper solution for wildfire monitoring. However, this application requires a design of WSN taking into account the network lifetime and the shadowing effect generated by the trees in the forest environment. Cooperative communication is a promising solution for WSN which uses, at each hop, the resources of multiple nodes to transmit its data. Thus, by sharing resources between nodes, the transmission quality is enhanced. In this paper, we use the technique of reinforcement learning by opponent modeling, optimizing a cooperative communication protocol based on RSSI and node energy consumption in a competitive context (RSSI/energy-CC), that is, an energy and quality-of-service aware-based cooperative communication routing protocol. Simulation results show that the proposed algorithm performs well in terms of network lifetime, packet delay, and energy consumption.
Content distribution with mobile-to-mobile cooperation is studied. Data is sent to mobile terminals on a long range link then the terminals exchange the content using an appropriate short range wireless technology. Unicasting and multicasting are investigated, both on the long range and short range links. Energy minimization is formulated as an optimization problem for each scenario, and the optimal solutions are determined in closed form. Moreover, the schemes are applied in public safety vehicular networks, where Long Term Evolution (LTE) network is used for the long range link, while IEEE 802.11 p is considered for inter-vehicle collaboration on the short range links. Finally, relay-based multicasting is applied in high speed trains for energy and delay minimization. Results show that cooperative schemes outperform non-cooperative ones and other previous related work in terms of energy and delay savings. Furthermore, practical implementation aspects of the proposed methods are also discussed.
Hosseini, S. Amir; Lu, Zheng; de Veciana, Gustavo; Panwar, Shivendra S.
In this paper, we present an approach for joint rate allocation and quality selection for a novel video streaming scheme called streamloading. Streamloading is a recently developed method for delivering high quality video without violating copyright enforced restrictions on content access for video streaming. In regular streaming services, content providers restrict the amount of viewable video that users can download prior to playback. This approach can cause inferior user experience due to ...
Full Text Available Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.
Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho
A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).
Marjanovic, Nicholas; Kerr, Kevin; Aranda, Ricardo; Hickey, Richard; Esmailbeigi, Hananeh
Controlling a computer or a smartphone's cursor allows the user to access a world full of information. For millions of people with limited upper extremities motor function, controlling the cursor becomes profoundly difficult. Our team has developed the User Interface Cursor-Controller (UIC-C) to assist the impaired individuals in regaining control over the cursor. The UIC-C is a hands-free device that utilizes the tongue muscle to control the cursor movements. The entire device is housed inside a subject specific retainer. The user maneuvers the cursor by manipulating a joystick imbedded inside the retainer via their tongue. The joystick movement commands are sent to an electronic device via a Bluetooth connection. The device is readily recognizable as a cursor controller by any Bluetooth enabled electronic device. The device testing results have shown that the time it takes the user to control the cursor accurately via the UIC-C is about three times longer than a standard computer mouse controlled via the hand. The device does not require any permanent modifications to the body; therefore, it could be used during the period of acute rehabilitation of the hands. With the development of modern smart homes, and enhancement electronics controlled by the computer, UIC-C could be integrated into a system that enables individuals with permanent impairment, the ability to control the cursor. In conclusion, the UIC-C device is designed with the goal of allowing the user to accurately control a cursor during the periods of either acute or permanent upper extremities impairment.
Olsen, Anders Brødløs; Fitzek, Frank H. P.; Koch, Peter
It is generally accepted that energy consumption is a significant design constraint for mobile handheld systems, therefore motivations for methods optimizing the energy consumption making better use of the restricted battery resources are evident. A novel concept of distributed task computing...... is previously proposed (D2VS), where the overall idea of selective distribution of tasks among terminals is made. In this paper the optimal number of terminals for cooperative task computing in a wireless network will be investigated. The paper presents an energy model for the proposed scheme. Energy...
Militano, Leonardo; Fitzek, Frank; Iera, Antonio
, portions of a file to be successively exchanged among all cluster members over wireless local area network (WLAN) links. Besides showing the beneficial effects of cooperation, this paper also focuses on the performance enhancement that can be achieved when using the network coding paradigm, whose...... deployment revealed to be very effective in the depicted scenario. The selection of the nodes acting as sources for file injection into the cluster is a critical aspect for the effectiveness of the whole system. Therefore, the potentialities offered by the evolutionary theory applied to the specific problem...
Chen, Huifang; Ge, Linlin; Xie, Lei
The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes. PMID:26184224
Chen, Huifang; Ge, Linlin; Xie, Lei
The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.
Park, YoHan; Park, YoungHo
Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.'s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment.
Full Text Available A wireless-powered sensor network (WPSN consisting of one hybrid access point (HAP, a near cluster and the corresponding far cluster is investigated in this paper. These sensors are wireless-powered and they transmit information by consuming the harvested energy from signal ejected by the HAP. Sensors are able to harvest energy as well as store the harvested energy. We propose that if sensors in near cluster do not have their own information to transmit, acting as relays, they can help the sensors in a far cluster to forward information to the HAP in an amplify-and-forward (AF manner. We use a finite Markov chain to model the dynamic variation process of the relay battery, and give a general analyzing model for WPSN with cluster cooperation. Though the model, we deduce the closed-form expression for the outage probability as the metric of this network. Finally, simulation results validate the start point of designing this paper and correctness of theoretical analysis and show how parameters have an effect on system performance. Moreover, it is also known that the outage probability of sensors in far cluster can be drastically reduced without sacrificing the performance of sensors in near cluster if the transmit power of HAP is fairly high. Furthermore, in the aspect of outage performance of far cluster, the proposed scheme significantly outperforms the direct transmission scheme without cooperation.
Zhang, Chao; Zhang, Pengcheng; Zhang, Weizhan
A wireless-powered sensor network (WPSN) consisting of one hybrid access point (HAP), a near cluster and the corresponding far cluster is investigated in this paper. These sensors are wireless-powered and they transmit information by consuming the harvested energy from signal ejected by the HAP. Sensors are able to harvest energy as well as store the harvested energy. We propose that if sensors in near cluster do not have their own information to transmit, acting as relays, they can help the sensors in a far cluster to forward information to the HAP in an amplify-and-forward (AF) manner. We use a finite Markov chain to model the dynamic variation process of the relay battery, and give a general analyzing model for WPSN with cluster cooperation. Though the model, we deduce the closed-form expression for the outage probability as the metric of this network. Finally, simulation results validate the start point of designing this paper and correctness of theoretical analysis and show how parameters have an effect on system performance. Moreover, it is also known that the outage probability of sensors in far cluster can be drastically reduced without sacrificing the performance of sensors in near cluster if the transmit power of HAP is fairly high. Furthermore, in the aspect of outage performance of far cluster, the proposed scheme significantly outperforms the direct transmission scheme without cooperation.
Rabie, Khaled M.
Energy-harvesting (EH) and wireless power transfer in cooperative relaying networks have recently attracted a considerable amount of research attention. Most of the existing work on this topic however focuses on Rayleigh fading channels which represents outdoor environments. Unlike these studies, in this paper we analyze the performance of wireless power transfer in two-hop decode-and- forward (DF) cooperative relaying systems in indoor channels characterized by log-normal fading. Three well-known EH protocols are considered in our evaluations: a) time switching relaying (TSR), b) power splitting relaying (PSR) and c) ideal relaying receiver (IRR). The performance is evaluated in terms of the ergodic outage probability for which we derive accurate analytical expressions for the three systems under consideration. Results reveal that careful selection of the EH time and power splitting factors in the TSR- and PSR-based system are important to optimize performance. It is also presented that the optimized PSR system has near- ideal performance and that increasing the source transmit power and/or the energy harvester efficiency can further improve performance.
Efficient implementation of resource sharing strategies in a multi-user wireless environment can improve the performance of a network significantly. In this thesis we study various scheduling strategies for wireless networks and handle the problem of opportunistically scheduling transmissions using channel aware schemes. First we propose a scheme that can handle users with asymmetric channel conditions and is opportunistic in the sense that it exploits the multi-user diversity of the network. The scheme requires the users to have a priori knowledge of their channel distributions. The associated overhead is limited meaning it offers reduced feedback load, that does not scale with the increasing number of users. The main technique used to shrink the feedback load is the contention based distributed implementation of a splitting algorithm that does not require explicit feedback to the scheduler from every user. The users find the best among themselves, in a distributed manner, while requiring just a ternary broadcast feedback from the scheduler at the end of each mini-slot. In addition, it can also handle fairness constraints in time and throughput to various degrees. Next we propose another opportunistic scheduler that offers most of the benefits of the previously proposed scheme but is more practical because it can also handle heterogenous users whose channel distributions are unknown. This new scheme actually reduces the complexity and is also more robust for changing traffic patterns. Finally we extend both these schemes to the scenario where there are fixed thresholds, this enables us to handle opportunistic scheduling in practical systems that can only transmit over finite number of discrete rates with the additional benefit that full feedback session, even from the selected user, is never required.
Heide, Janus; Fitzek, Frank; Pedersen, Morten Videbæk
This paper highlights the benefits of user cooperation and network coding for energy saving in cellular networks. It is shown that these techniques allow for reliable and efficient multicast services from both a user and network perspective. The working principles and advantages in terms of energy...... and spectrum usage is explained for user cooperation, network coding and a combination of both. For multicast services it is shown that the proposed approaches can save as much as 90% of the energy on the user side and 66% on network provider side for the topologies under investigation. One interesting finding...... is that user cooperation can be beneficial for the network operator even if some users refuse to cooperate....
Full Text Available A distributed and cooperative link-scheduling (DCLS algorithm is introduced for large-scale multihop wireless networks. With this algorithm, each and every active link in the network cooperatively calibrates its environment and converges to a desired link schedule for data transmissions within a time frame of multiple slots. This schedule is such that the entire network is partitioned into a set of interleaved subnetworks, where each subnetwork consists of concurrent cochannel links that are properly separated from each other. The desired spacing in each subnetwork can be controlled by a tuning parameter and the number of time slots specified for each frame. Following the DCLS algorithm, a distributed and cooperative power control (DCPC algorithm can be applied to each subnetwork to ensure a desired data rate for each link with minimum network transmission power. As shown consistently by simulations, the DCLS algorithm along with a DCPC algorithm yields significant power savings. The power savings also imply an increased feasible region of averaged link data rates for the entire network.
Ezejiofo Patrick Udeh
Full Text Available Research regarding commercial and free wireless fidelity (Wi-Fi public hot spots acceptance and adoption is sketchy. Therefore, it has become imperative to understand the critical factors that affect their acceptance. The focus of this study is free Wi-Fi public hot spot users, with the objective to better understand their user acceptance. In doing so, this study integrated two well-established initial acceptance models, specifically, the technology acceptance model and the diffusion of innovation theory. This study was conducted using an on-line survey that collected data from 129 users. It uses the Partial Least Square (PLS technique to examine the relationship between variables. The results indicate that each critical factor has direct or indirect positive effects on current use and/or future use intention, which confirmed the majority of the proposed hypotheses. Relative advantage emerged as the only construct with a direct positive effect on both current use and future use intentions.
Full Text Available In IEEE 802.11-based wireless networks, the stations (STAs are associated with the available access points (APs and communicate through them. In traditional handoff schemes, the STAs get information about the active APs in their neighborhood by scanning the available channels and listening to transmitted beacons. This paper proposes an 802.11k compliant framework for cooperative handoff where the STAs are informed about the active APs by exchanging information with neighboring STAs. Besides, the APs share useful information that can be used by the STAs in a handoff process. In this way, we minimize the delay of the scanning procedure. We evaluate the performance of our mechanisms through OPNET simulations. We demonstrate that our scheme reduces the scanning delay up to 92%. Consequently, our system is more capable in meeting the needs of QoS-sensitive applications.
Full Text Available Abstract In IEEE 802.11-based wireless networks, the stations (STAs are associated with the available access points (APs and communicate through them. In traditional handoff schemes, the STAs get information about the active APs in their neighborhood by scanning the available channels and listening to transmitted beacons. This paper proposes an 802.11k compliant framework for cooperative handoff where the STAs are informed about the active APs by exchanging information with neighboring STAs. Besides, the APs share useful information that can be used by the STAs in a handoff process. In this way, we minimize the delay of the scanning procedure. We evaluate the performance of our mechanisms through OPNET simulations. We demonstrate that our scheme reduces the scanning delay up to 92%. Consequently, our system is more capable in meeting the needs of QoS-sensitive applications.
Full Text Available As an essential part of Internet of Things (IoT, wireless sensor networks (WSNs have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows–Abadi–Needham (BAN logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme.
Wang, Chenyu; Xu, Guoai; Sun, Jing
As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows-Abadi-Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme.
Full Text Available In this paper, we consider the precoding design and power allocation problem for multi-user multiple-input multiple-output (MU-MIMO wireless ad hoc networks. In the first timeslot, the source node (SN transmits energy and information to a relay node (RN simultaneously within the simultaneous wireless information and power transfer (SWIPT framework. Then, in the second timeslot, based on the decoder and the forwarding (DF protocol, after reassembling the received signal and its own signal, the RN forwards the information to the main user (U1 and simultaneously sends its own information to the secondary user (U2. In this paper, when the transmission rate of the U1 is restricted, the precoding, beamforming, and power splitting (PS transmission ratio are jointly considered to maximize the transmission rate of U2. To maximize the system rate, we design an optimal beamforming matrix and solve the optimization problem by semi-definite relaxation (SDR, considering the high complexity of implementing the optimal solution. Two sub-optimal precoding programs are also discussed: singular value decomposition and block diagonalization. Finally, the performance of the optimization and sub-optimization schemes are compared using a simulation.
Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs. PMID:24919012
Full Text Available Wireless sensor networks (WSNs consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC for WSNs. However, it turned out that Yeh et al.’s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.’s protocol. However, Shi et al.’s improvement introduces other security weaknesses. In this paper, we show that Shi et al.’s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.
Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.
Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.
Full Text Available We propose two novel cooperative detection schemes based on the AF (Amplify and Forward and DF (Decode and Forward protocols to achieve spatial diversity gains for cognitive radio networks, which are referred to as the AF-CDS, (AF-based Cooperative Detection Scheme and DF-CDS (DF-based Cooperative Detection Scheme, respectively. Closed-form expressions of detection probabilities for the noncooperation scheme, AND-CDS (AND-based Cooperative Detection Scheme, AF-CDS and DF-CDS, are derived over Rayleigh fading channels. Also, we analyze the overall agility for the proposed cooperative detection schemes and show that our schemes can further reduce the detection time. In addition, we compare the DF-CDS with the AF-CDS in terms of detection probability and agility gain, depicting the advantage of DF-CDS at low SNR region and high false alarm probability region.
Full Text Available A recently developed theory suggests that network coding is a generalization of source coding and channel coding and thus yields a significant performance improvement in terms of throughput and spatial diversity. This paper proposes a cooperative design of a parity-check network coding scheme in the context of a two-source multiple access relay channel (MARC model, a common compact model in hierarchical wireless sensor networks (WSNs. The scheme uses Low-Density Parity-Check (LDPC as the surrogate to build up a layered structure which encapsulates the multiple constituent LDPC codes in the source and relay nodes. Specifically, the relay node decodes the messages from two sources, which are used to generate extra parity-check bits by a random network coding procedure to fill up the rate gap between Source-Relay and Source-Destination transmissions. Then, we derived the key algebraic relationships among multidimensional LDPC constituent codes as one of the constraints for code profile optimization. These extra check bits are sent to the destination to realize a cooperative diversity as well as to approach MARC decode-and-forward (DF capacity.
M. E. Migabo
Full Text Available Despite its low computational cost, the Gradient Based Routing (GBR broadcast of interest messages in Wireless Sensor Networks (WSNs causes significant packets duplications and unnecessary packets transmissions. This results in energy wastage, traffic load imbalance, high network traffic, and low throughput. Thanks to the emergence of fast and powerful processors, the development of efficient network coding strategies is expected to enable efficient packets aggregations and reduce packets retransmissions. For multiple sinks WSNs, the challenge consists of efficiently selecting a suitable network coding scheme. This article proposes a Cooperative and Adaptive Network Coding for GBR (CoAdNC-GBR technique which considers the network density as dynamically defined by the average number of neighbouring nodes, to efficiently aggregate interest messages. The aggregation is performed by means of linear combinations of random coefficients of a finite Galois Field of variable size GF(2S at each node and the decoding is performed by means of Gaussian elimination. The obtained results reveal that, by exploiting the cooperation of the multiple sinks, the CoAdNC-GBR not only improves the transmission reliability of links and lowers the number of transmissions and the propagation latency, but also enhances the energy efficiency of the network when compared to the GBR-network coding (GBR-NC techniques.
Muhammad Khurram Khan
Full Text Available User authentication in wireless sensor networks (WSN is a critical security issue due to their unattended and hostile deployment in the field. Since sensor nodes are equipped with limited computing power, storage, and communication modules; authenticating remote users in such resource-constrained environments is a paramount security concern. Recently, M.L. Das proposed a two-factor user authentication scheme in WSNs and claimed that his scheme is secure against different kinds of attack. However, in this paper, we show that the M.L. Das-scheme has some critical security pitfalls and cannot be recommended for real applications. We point out that in his scheme: users cannot change/update their passwords, it does not provide mutual authentication between gateway node and sensor node, and is vulnerable to gateway node bypassing attack and privileged-insider attack. To overcome the inherent security weaknesses of the M.L. Das-scheme, we propose improvements and security patches that attempt to fix the susceptibilities of his scheme. The proposed security improvements can be incorporated in the M.L. Das-scheme for achieving a more secure and robust two-factor user authentication in WSNs.
Khan, Muhammad Khurram; Alghathbar, Khaled
User authentication in wireless sensor networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since sensor nodes are equipped with limited computing power, storage, and communication modules; authenticating remote users in such resource-constrained environments is a paramount security concern. Recently, M.L. Das proposed a two-factor user authentication scheme in WSNs and claimed that his scheme is secure against different kinds of attack. However, in this paper, we show that the M.L. Das-scheme has some critical security pitfalls and cannot be recommended for real applications. We point out that in his scheme: users cannot change/update their passwords, it does not provide mutual authentication between gateway node and sensor node, and is vulnerable to gateway node bypassing attack and privileged-insider attack. To overcome the inherent security weaknesses of the M.L. Das-scheme, we propose improvements and security patches that attempt to fix the susceptibilities of his scheme. The proposed security improvements can be incorporated in the M.L. Das-scheme for achieving a more secure and robust two-factor user authentication in WSNs.
Ollero, Anibal; Bernard, Markus; La Civita, Marco; van Hoesel, L.F.W.; Marron, Pedro J.; Lepley, Jason; de Andres, Eduardo
This paper presents the AWARE platform that seeks to enable the cooperation of autonomous aerial vehicles with ground wireless sensor-actuator networks comprising both static and mobile nodes carried by vehicles or people. Particularly, the paper presents the middleware, the wireless sensor network,
El Astal, M. T O
We focus on the uplink channel of multi-user wireless relaying networks in a coverage extension scenario. The network consists of two users, a single half duplex (HD) relay and a destination, all equipped with multiple antennas. Perfect channel state information (CSI) is assumed to be available exclusively at the receiving nodes (i.e., the relay and the destination) while the users are assumed to be completely blind. The communication through the considered network takes place over two phases. During the first phase, both users send their information concurrently to the relay. The second phase consists of decoding the received data and forwarding it simultaneously to the destination. A transmission scheme that achieves full-diversity under partial interference cancellation (PIC) group decoding is proposed. Unlike many existing schemes, it allows the concurrent transmission in both phases while achieving the full-diversity gain of full time division multiple access (TDMA) transmission regardless of the number of antennas at each node. Numerical comparison with existing schemes in the literature is provided to corroborate our theoretical claims. It is found that our interference cancellation (IC) scheme clearly outperforms existing schemes at the expense of an affordable increase in decoding complexity at both of the relay and destination. © 2013 IEEE.
Full Text Available We ran an experiment with users of Internet forums. In a dictator game, we find that the level of altruism is positively related to the activity in the forum. In a public good game, there is no relation between cooperation in the game and contribution to the content of the forum. Subjects are not more altruistic with partners from the same forum but do cooperate more with them. These results suggest that the public good provided in Internet forums is mainly provided by a group of unconditional altruistic users, and that the sense of belonging supports the cooperation in that provision.
Masoum, Alireza; Meratnia, Nirvana; Taghikhaki, Zahra; Havinga, Paul J.M.
Energy conservation is one of the main concerns in wireless sensor networks. One of the mechanisms to better manage energy in wireless sensor networks is adaptive sampling, by which instead of using a fixed frequency interval for sensing and data transmission, the wireless sensor network employs a
Ahmed, Qasim Zeeshan
This paper investigates and compares the performance of wireless sensor networks where sensors operate on the principles of cooperative communications. We consider a scenario where the source transmits signals to the destination with the help of L sensors. As the destination has the capacity of processing only U out of these L signals, the strongest U signals are selected while the remaining (L?U) signals are suppressed. A preprocessing block similar to channel-shortening is proposed in this contribution. However, this preprocessing block employs a rank-reduction technique instead of channel-shortening. By employing this preprocessing, we are able to decrease the computational complexity of the system without affecting the bit error rate (BER) performance. From our simulations, it can be shown that these schemes outperform the channel-shortening schemes in terms of computational complexity. In addition, the proposed schemes have a superior BER performance as compared to channel-shortening schemes when sensors employ fixed gain amplification. However, for sensors which employ variable gain amplification, a tradeoff exists in terms of BER performance between the channel-shortening and these schemes. These schemes outperform channel-shortening scheme for lower signal-to-noise ratio.
Full Text Available Localization is one of the major aspects in underwater wireless sensor networks (UWSNs. Therefore, it is important to know the accurate position of the sensor node in large scale applications like disaster prevention, tactical surveillance, and monitoring. Due to the inefficiency of the global positioning system (GPS in UWSN, it is very difficult to localize a node in underwater environment compared to terrestrial networks. To minimize the localization error and enhance the localization coverage of the network, two routing protocols are proposed; the first one is mobile autonomous underwater vehicle (MobiL-AUV and the second one is cooperative MobiL (CO-MobiL. In MobiL-AUV, AUVs are deployed and equipped with GPS and act as reference nodes. These reference nodes are used to localize all the nonlocalized ordinary sensor nodes in order to reduce the localization error and maximize the network coverage. CO-MobiL is presented in order to improve the network throughput by using the maximal ratio combining (MRC as diversity technique which combines both signals, received from the source and received from the relay at the destination. It uses amplify-and-forward (AF mechanism to improve the signal between the source and the destination. To support our claims, extensive simulations are performed.
Pan, Jeffrey Junfeng; Pan, Sinno Jialin; Yin, Jie; Ni, Lionel M; Yang, Qiang
Recent years have witnessed the growing popularity of sensor and sensor-network technologies, supporting important practical applications. One of the fundamental issues is how to accurately locate a user with few labeled data in a wireless sensor network, where a major difficulty arises from the need to label large quantities of user location data, which in turn requires knowledge about the locations of signal transmitters or access points. To solve this problem, we have developed a novel machine learning-based approach that combines collaborative filtering with graph-based semi-supervised learning to learn both mobile users' locations and the locations of access points. Our framework exploits both labeled and unlabeled data from mobile devices and access points. In our two-phase solution, we first build a manifold-based model from a batch of labeled and unlabeled data in an offline training phase and then use a weighted k-nearest-neighbor method to localize a mobile client in an online localization phase. We extend the two-phase colocalization to an online and incremental model that can deal with labeled and unlabeled data that come sequentially and adapt to environmental changes. Finally, we embed an action model to the framework such that additional kinds of sensor signals can be utilized to further boost the performance of mobile tracking. Compared to other state-of-the-art systems, our framework has been shown to be more accurate while requiring less calibration effort in our experiments performed on three different testbeds.
Rohokale, Vandana M.; Inamdar, Sandeep; Prasad, Neeli R.
For wireless sensor networks (WSN),energy is a scarce resource. Due to limited battery resources, the energy consumption is the critical issue for the transmission as well as reception of the signals in the wireless communication. WSNs are infrastructure-less shared network demanding more energy ...
Shi, Juanfei; Calveras, Anna; Cheng, Ye; Liu, Kai
The extensive usage of wireless sensor networks (WSNs) has led to the development of many power- and energy-efficient routing protocols. Cooperative routing in WSNs can improve performance in these types of networks. In this paper we discuss the existing proposals and we propose a routing algorithm for wireless sensor networks called Power Efficient Location-based Cooperative Routing with Transmission Power-upper-limit (PELCR-TP). The algorithm is based on the principle of minimum link power and aims to take advantage of nodes cooperation to make the link work well in WSNs with a low transmission power. In the proposed scheme, with a determined transmission power upper limit, nodes find the most appropriate next nodes and single-relay nodes with the proposed algorithm. Moreover, this proposal subtly avoids non-working nodes, because we add a Bad nodes Avoidance Strategy (BAS). Simulation results show that the proposed algorithm with BAS can significantly improve the performance in reducing the overall link power, enhancing the transmission success rate and decreasing the retransmission rate.
Full Text Available Considering the constrained resource and energy in wireless sensor networks, an efficient data collection protocol named ESCDD which adopts the multihop routing technology and the single-node selection cooperative communication is proposed to make the communication protocol more simple and easy to realize for the large-scale multihop wireless sensor networks. ESCDD uses the greedy strategy and the control information based on RTS/CTS to select forwarding nodes. Then, the hops in the multihop data transmission are reduced. Based on the power control in physical layer and the control frame called CoTS in MAC layer, ESCDD chooses a single cooperative node to perform cooperative transmission. The receiving node adopts maximal ratio combining (MRC to recover original data. The energy consumption per hop is reduced. Furthermore, the total energy consumption in data collection process is shared by more nodes and the network lifetime is extended. Compared with GeRaF, EERNFS, and REEFG protocol, the simulation results show that ESCDD can effectively reduce the average delay of multihop data transmission, improve the successful delivery rate of data packets, significantly save the energy consumption of network nodes, and make the energy consumption more balanced.
Panchard, Jacques; Rao, Seshagiri; Sheshshayee, S.
This document describes a user experiment that was conducted between October 2007 and February 2008 around a wireless sensor network for rain-fed agriculture. The experiment was organized jointly by UAS, the CK Trust and the EPFL. The participants came from an Indian university of agriculture, an Indian non-governmental organization active in rain-fed farming sustainability, and the Kanrnataka department of agriculture.
Full Text Available In cognitive radio network (CRN, secondary users (SUs try to sense and utilize the vacant spectrum of the legitimate primary user (PU in an efficient manner. The process of cooperation among SUs makes the sensing more authentic with minimum disturbance to the PU in achieving maximum utilization of the vacant spectrum. One problem in cooperative spectrum sensing (CSS is the occurrence of malicious users (MUs sending false data to the fusion center (FC. In this paper, the FC takes a global decision based on the hard binary decisions received from all SUs. Genetic algorithm (GA using one-to-many neighbor distance along with z-score as a fitness function is used for the identification of accurate sensing information in the presence of MUs. The proposed scheme is able to avoid the effect of MUs in CSS without identification of MUs. Four types of abnormal SUs, opposite malicious user (OMU, random opposite malicious user (ROMU, always yes malicious user (AYMU, and always no malicious user (ANMU, are discussed in this paper. Simulation results show that the proposed hard fusion scheme has surpassed the existing hard fusion scheme, equal gain combination (EGC, and maximum gain combination (MGC schemes by employing GA.
In a cognitive sensor network (CSN), the wastage of sensing time and energy is a challenge to cooperative spectrum sensing, when the number of cooperative cognitive nodes (CNs) becomes very large. In this paper, a novel wireless power transfer (WPT)-based weighed clustering cooperative spectrum sensing model is proposed, which divides all the CNs into several clusters, and then selects the most favorable CNs as the cluster heads and allows the common CNs to transfer the received radio frequency (RF) energy of the primary node (PN) to the cluster heads, in order to supply the electrical energy needed for sensing and cooperation. A joint resource optimization is formulated to maximize the spectrum access probability of the CSN, through jointly allocating sensing time and clustering number. According to the resource optimization results, a clustering algorithm is proposed. The simulation results have shown that compared to the traditional model, the cluster heads of the proposed model can achieve more transmission power and there exists optimal sensing time and clustering number to maximize the spectrum access probability.
Full Text Available In wireless sensor networks (WSNs, users can use broadcast authentication mechanisms to connect to the target network and disseminate their messages within the network. Since data transfer for sensor networks is wireless, as a result, attackers can easily eavesdrop deployed sensor nodes and the data sent between them or modify the content of eavesdropped data and inject false data into the sensor network. Hence, the implementation of the message authentication mechanisms (in order to avoid changes and injecting messages into the network of wireless sensor networks is essential. In this paper, we present an improved protocol based on elliptic curve cryptography (ECC to accelerate authentication of multi-user message broadcasting. In comparison with previous ECC-based schemes, complexity and computational overhead of proposed scheme is significantly decreased. Also, the proposed scheme supports user anonymity, which is an important property in broadcast authentication schemes for WSNs to preserve user privacy and user untracking.
Full Text Available Pervasive wireless systems have significantly improved end-users’ quality of life. As manufacturing costs decrease, communications bandwidth increases, and contextual information is made more readily available, the role of next generation wireless systems in facilitating users’ daily activities will grow. Unique security and privacy issues exist in these wireless, context-aware, often decentralized systems. For example, the pervasive nature of such systems allows adversaries to launch stealthy attacks against them. In this review paper, we survey several emergent personal wireless systems and their applications. These systems include mobile social networks, active implantable medical devices, and consumer products. We explore each system’s usage of contextual information and provide insight into its security vulnerabilities. Where possible, we describe existing solutions for defendingagainst these vulnerabilities. Finally, we point out promising future research directions for improving these systems’ robustness and security
... ``Actions'' column. If you do not have access to the Internet, you may view the docket online by visiting... technology or services. Since the goal of this CRADA is to identify and investigate the advantages, disadvantages, performance, costs, and other issues associated with using alternative wireless time technology...
Erman-Tüysüz, A.; van Hoesel, L.F.W.; Wu Jian, W.J.; Havinga, Paul J.M.
Wireless sensor networks (WSNs) have the promise of revolutionizing the capture, processing, and communication of mission critical data for the use of first operational forces. Their low-cost, low-power, and size make it feasible to embed them into environment-monitoring tags in critical care
Erman-Tüysüz, A.; van Hoesel, L.F.W.; Havinga, Paul J.M.; Wu Jian, W.J.
Wireless sensor networks have the promise of revolutionizing the capture, processing, and communication of mission-critical data for the use of first operational forces. Their low cost, low power, and size make it feasible to embed them into environment monitoring tags in critical care regions,
This book is unique in presenting channels, techniques and standards for the next generation of MIMO wireless networks. Through a unified framework, it emphasizes how propagation mechanisms impact the system performance under realistic power constraints. Combining a solid mathematical analysis with a physical and intuitive approach to space-time signal processing, the book progressively derives innovative designs for space-time coding and precoding as well as multi-user and multi-cell techniques, taking into consideration that MIMO channels are often far from ideal. Reflecting developments
Full Text Available Nowadays, location-enabled mobile phones are becoming more and more widespread. Various players in the mobile business forecast that, in the future, a significant part of total wireless revenue will come from Location-Based Services (LBS. An LBS system extracts information about the user’s geographical location and provides services based on the positioning information. A successful LBS service should create value for the end-user, by satisfying some of the users’ needs or wants, and at the same time preserving the key factors of the mobile wireless device, such as low costs, low battery consumption, and small size. From many users’ perspectives, location services and mobile location capabilities are still rather poorly known and poorly understood. The aim of this research is to investigate users’ views on the LBS, their requirements in terms of mobile device characteristics, their concerns in terms of privacy and usability, and their opinion on LBS applications that might increase the social wellbeing in the future wireless world. Our research is based on two surveys performed among 105 students (average student age: 24 years from two European technical universities. The survey questions were intended to solicit the youngsters’ views on present and future technological trends and on their perceived needs and wishes regarding Location-Based Services, with the aim of obtaining a better understanding of designer constraints when building a location receiver and generating new ideas related to potential future killer LBS applications.
Anup Kumar Maurya
Full Text Available To improve the quality of service and reduce the possibility of security attacks, a secure and efficient user authentication mechanism is required for Wireless Sensor Networks (WSNs and the Internet of Things (IoT. Session key establishment between the sensor node and the user is also required for secure communication. In this paper, we perform the security analysis of A.K.Das’s user authentication scheme (given in 2015, Choi et al.’s scheme (given in 2016, and Park et al.’s scheme (given in 2016. The security analysis shows that their schemes are vulnerable to various attacks like user impersonation attack, sensor node impersonation attack and attacks based on legitimate users. Based on the cryptanalysis of these existing protocols, we propose a secure and efficient authenticated session key establishment protocol which ensures various security features and overcomes the drawbacks of existing protocols. The formal and informal security analysis indicates that the proposed protocol withstands the various security vulnerabilities involved in WSNs. The automated validation using AVISPA and Scyther tool ensures the absence of security attacks in our scheme. The logical verification using the Burrows-Abadi-Needham (BAN logic confirms the correctness of the proposed protocol. Finally, the comparative analysis based on computational overhead and security features of other existing protocol indicate that the proposed user authentication system is secure and efficient. In future, we intend to implement the proposed protocol in real-world applications of WSNs and IoT.
Full Text Available In wireless sensor networks (WSNs, a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.
Full Text Available -HSPA technologies, are the most common wireless broadband technology and facilitates a standards-based migration which allows the utilization of legacy infrastructure. 3G-HSPA systems can interoperate and share the core network with the legacy GSM 2G and 2.5G... networks. Also a packet switching core-network can be designed to share and interoperate with WiFi and WiMAX broadband wireless technologies. It is clear that standards-based migration lowers the cost of mobile broadband services. By utilizing...
Full Text Available Severe speech and motor impairments caused by several neurological disorders can limit communication skills to simple yes/no replies. Variability among patients’ physical and social conditions justifies the need of providing multiple sources of signals to access to Augmentative and Alternative Communication (AAC systems. Our study presents the development of a new user-computer interface that can be controlled by the detection of various sources of biosignals. Wireless sensors are placed on the body and users learn to enhance the control of detected signals by visual biofeedback, on a switch based control approach. Experimental results in four patients with just few residual movements showed that different sensors can be placed in different body locations and detect novel communication channels, according to each person’s physiological and social condition. Especially in progressive conditions, this system can be used by therapists to anticipate progression and assess new channels for communication.
Eldawy, H.A.; Khattab, F.I.; Hassan, N.H.A.; Amin, Y.M.; Mahmoud, M.M.A.
This study was carried out to investigate the hazardous effect of electromagnetic radiation (EMR) such as chromosomal aberration, disturbed micronucleus formation and hematological disorders that may detected among workers of wireless communication instruments and mobile phone users. Seven individuals ( 3 males and 4 females) of a central workers in the microwave unit of the wireless station and 7 users of Mobil phone (4 males and 3 females ) were volunteered to give blood samples. Chromosomes and micronucleus were prepared for cytogenetic analysis as well as blood film for differential count. The results obtained in the microwave group indicated that, the total summation of all types of aberrations (chromosomes and chromatid aberrations) had a frequency of 6. 14% for the exposed group, whereas, the frequency in the control group amounted to 1.57%. In Mobil phone users, the total summation of all types of aberrations(chromosome and chromatid aberrations) had a frequency of 4.43% for the exposed group and 1.71% for the control group. The incidence of the total number of micronuclei in the exposed microwave group was increased 4.3 folds as compared with those of the control group The incidence of the total number of micronuclei in the exposed mobile phone group was increased 2 fold as compared with those in the control group. On the other hand, normal ranges of total white blood cells counts were determined for mobile phone users but abnormalities in the differential counts of the different types of the white blood cells such as neutropenia, eosinophilia and lymphocytosis were observed in the individuals number 1,2,3,7 in microwave group
Full Text Available Cooperative spectrum sensing is a promising method for improving spectrum sensing performance in cognitive radio. Although it yields better spectrum sensing performance, it also incurs additional energy consumption that drains more energy from the sensor nodes and hence shortens the lifetime of sensor networks. This paper proposes energy minimization approach to reduce energy consumption due to spectrum sensing and sensed result reporting in a cooperative spectrum sensing. The approach determines optimal number of cooperative sensing nodes using particle swarm optimization. We derived mathematical lower bound and upper bound for the number of cooperative sensing nodes in the network. Then we formulate a constraint optimization problem and used particle swarm optimization to simultaneously optimize the two mathematical bounds to determine the optimal number of sensing nodes. Simulation results indicate viability of the proposed approach and show that significant amount of energy savings can be achieved by employing optimal number of sensing nodes for cooperative spectrum sensing. Performance comparison with conventional approach shows performance improvement of the proposed approach over the conventional method in minimizing spectrum sensing energy consumption without compromising spectrum sensing performance.
Full Text Available Recent studies have shown that in realistic wireless sensor network environments links are extremely unreliable. To recover from corrupted packets, most routing schemes with an assumption of ideal radio environments use a retransmission mechanism, which may cause unnecessary retransmissions. Therefore, guaranteeing energy-efficient reliable data transmission is a fundamental routing issue in wireless sensor networks. However, it is not encouraged to propose a new reliable routing scheme in the sense that every existing routing scheme cannot be replaced with the new one. This paper proposes a Distributed and Reliable Data Transmission (DRDT scheme with a goal to efficiently guarantee reliable data transmission. In particular, this is based on a pluggable modular approach so that it can be extended to existing routing schemes. DRDT offers reliable data transmission using neighbor nodes, i.e., helper nodes. A helper node is selected among the neighbor nodes of the receiver node which overhear the data packet in a distributed manner. DRDT effectively reduces the number of retransmissions by delegating the retransmission task from the sender node to the helper node that has higher link quality to the receiver node when the data packet reception fails due to the low link quality between the sender and the receiver nodes. Comprehensive simulation results show that DRDT improves end-to-end transmission cost by up to about 45% and reduces its delay by about 40% compared to existing schemes.
Della Rosa, Francescantonio; Frattasi, Simone; Figueiras, Joao
Conventional software applications are usually operated on a platform similar to the one on which they were developed and tested. Wireless application development, on the other hand, is more challenging because applications are developed on one platform (like UNIX or Windows) and deployed on a to...... - Wireless application programming models - Testing and deploying wireless applications - Applying the Service-Oriented Architecture - Web services for mobile devices - Securing wireless applications and service...... on a totally different platform like a mobile phone or a BlackBerry device. While wireless applications can be much smaller than conventional desktop applications, developers should think in the small in terms of the devices on which the applications will run and the environment in which they will operate...... instead of the amount of code to be written. This tutorial will help participants understand the different technologies that can be used to develop wireless applications for handheld wireless devices. Participants will acquire knowledge about wireless programming techniques in general and Java programming...
OTA, Kaoru; DONG, Mianxiong; CHANG, Shan; ZHU, Hongzi
Advances in low-power wireless communications and micro-electronics make a great impact on a transportation system and pervasive deployment of road-side units (RSU) is promising to provide drive-thru Internet to vehicular users anytime and anywhere. Downloading data packets from the RSU, however, is not always reliable because of high mobility of vehicles and high contention among vehicular users. Using inter-vehicle communication, cooperative downloading can maximize the amount of data packe...
Yeom, Jeong Seon; Chu, Eunmi; Jung, Bang Chul; Jin, Hu
In this paper, we propose a novel low-complexity multi-user superposition transmission (MUST) technique for 5G downlink networks, which allows multiple cell-edge users to be multiplexed with a single cell-center user. We call the proposed technique diversity-controlled MUST technique since the cell-center user enjoys the frequency diversity effect via signal repetition over multiple orthogonal frequency division multiplexing (OFDM) sub-carriers. We assume that a base station is equipped with a single antenna but users are equipped with multiple antennas. In addition, we assume that the quadrature phase shift keying (QPSK) modulation is used for users. We mathematically analyze the bit error rate (BER) of both cell-edge users and cell-center users, which is the first theoretical result in the literature to the best of our knowledge. The mathematical analysis is validated through extensive link-level simulations.
Hossain, Md Jahangir
Our contribution, in this paper, is two-fold. First, we analyze the performance of a hierarchical modulation-assisted two-best user opportunistic scheduling (TBS) scheme, which was proposed by the authors, in a fading environment where different users have different average link gains. Specifically, we present a new expression for the spectral efficiency (SE) of the users and using this expression, we compare the degrees of fairness (DOF) of the TBS scheme with that of classical single user opportunistic scheduling schemes, namely, absolute carrier-to-noise ratio (CNR) based single-best user scheduling (SBS) and normalized CNR based proportional fair scheduling (PFS) schemes. The second contribution is that we propose a new hybrid two-user opportunistic scheduling (HTS) scheme based on our earlier proposed TBS scheme. This HTS scheme selects the first user based on the largest absolute CNR value among all the users while the second user is selected based on the ratios of the absolute CNRs to the corresponding average CNRs of the remaining users. The total transmission rate i.e., the constellation size is selected according to the absolute CNR of the first best user. The total transmission rate is then allocated among these selected users by joint consideration of their absolute CNRs and allocated number of information bit(s) are transmitted to them using hierarchical modulations. Numerical results are presented for a fading environment where different users experience independent but non-identical (i.n.d.) channel fading. These selected numerical results show that the proposed HTS scheme can considerably increase the system\\'s fairness without any degradation of the link spectral efficiency (LSE) i.e., the multiuser diversity gain compared to the classical SBS scheme. These results also show that the proposed HTS scheme has a lower fairness in comparison to the PFS scheme which suffers from a considerable degradation in LSE. © 2010 IEEE.
Wu, Huafeng; Mei, Xiaojun; Chen, Xinqiang; Li, Junjun; Wang, Jun; Mohapatra, Prasant
Maritime search and rescue (MSR) play a significant role in Safety of Life at Sea (SOLAS). However, it suffers from scenarios that the measurement information is inaccurate due to wave shadow effect when utilizing wireless Sensor Network (WSN) technology in MSR. In this paper, we develop a Novel Cooperative Localization Algorithm (NCLA) in MSR by using an enhanced particle filter method to reduce measurement errors on observation model caused by wave shadow effect. First, we take into account the mobility of nodes at sea to develop a motion model-Lagrangian model. Furthermore, we introduce both state model and observation model to constitute a system model for particle filter (PF). To address the impact of the wave shadow effect on the observation model, we develop an optimal parameter derived by Kullback-Leibler divergence (KLD) to mitigate the error. After the optimal parameter is acquired, an improved likelihood function is presented. Finally, the estimated position is acquired. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.
Full Text Available The fault-tolerant routing problem is important consideration in the design of heterogeneous wireless sensor networks (H-WSNs applications, and has recently been attracting growing research interests. In order to maintain k disjoint communication paths from source sensors to the macronodes, we present a hybrid routing scheme and model, in which multiple paths are calculated and maintained in advance, and alternate paths are created once the previous routing is broken. Then, we propose an immune cooperative particle swarm optimization algorithm (ICPSOA in the model to provide the fast routing recovery and reconstruct the network topology for path failure in H-WSNs. In the ICPSOA, mutation direction of the particle is determined by multi-swarm evolution equation, and its diversity is improved by immune mechanism, which can enhance the capacity of global search and improve the converging rate of the algorithm. Then we validate this theoretical model with simulation results. The results indicate that the ICPSOA-based fault-tolerant routing protocol outperforms several other protocols due to its capability of fast routing recovery mechanism, reliable communications, and prolonging the lifetime of WSNs.
Full Text Available As a result of the rapidly increasing mobility of sensor nodes, mobile wireless sensor networks (MWSNs would be subject to multiple carrier frequency offsets (MCFOs, which result in time-varying channels and drastically degrade the network performance. To enhance the performance of such MWSNs, we propose a relay selection (RS based double-differential (DD cooperative transmission scheme, termed RSDDCT, in which the best relay sensor node is selected to forward the source sensor node’s signals to the destination sensor node with the detect-and-forward (DetF protocol. Assuming a Rayleigh fading environment, first, exact closed-form expressions for the outage probability and average bit error rate (BER of the RSDDCT scheme are derived. Then, simple and informative asymptotic outage probability and average BER expressions at the large signal-to-noise ratio (SNR regime are presented, which reveal that the RSDDCT scheme can achieve full diversity. Furthermore, the optimum power allocation strategy in terms of minimizing the average BER is investigated, and simple analytical solutions are obtained. Simulation results demonstrate that the proposed RSDDCT scheme can achieve excellent performance over fading channels in the presence of unknown random MCFOs. It is also shown that the proposed optimum power allocation strategy offers substantial average BER performance improvement over the equal power allocation strategy.
Full Text Available Improving the energy efficiency in wireless sensor networks (WSN has attracted considerable attention nowadays. The multiple-input multiple-output (MIMO technique has been proved as a good candidate for improving the energy efficiency, but it may not be feasible in WSN which is due to the size limitation of the sensor node. As a solution, the cooperative multiple-input multiple-output (CMIMO technique overcomes this constraint and shows a dramatically good performance. In this paper, a new CMIMO scheme based on the spatial modulation (SM technique named CMIMO-SM is proposed for energy-efficiency improvement. We first establish the system model of CMIMO-SM. Based on this model, the transmission approach is introduced graphically. In order to evaluate the performance of the proposed scheme, a detailed analysis in terms of energy consumption per bit of the proposed scheme compared with the conventional CMIMO is presented. Later, under the guide of this new scheme we extend our proposed CMIMO-SM to a multihop clustered WSN for further achieving energy efficiency by finding an optimal hop-length. Equidistant hop as the traditional scheme will be compared in this paper. Results from the simulations and numerical experiments indicate that by the use of the proposed scheme, significant savings in terms of total energy consumption can be achieved. Combining the proposed scheme with monitoring sensor node will provide a good performance in arbitrary deployed WSN such as forest fire detection system.
van Oost, Elizabeth C.J.; Verhaegh, Stefan; Oudshoorn, Nelly E.J.
The role of users in innovation processes has gained increasing attention in innovation studies, technology studies, and media studies. Scholars have identified users and use practices as a source of innovation. So far, however, little insight has been generated in innovation processes in which
Hossain, Md Jahangir
In our earlier works, we proposed rate adaptive hierarchical modulation-assisted two-best user opportunistic scheduling (TBS) and hybrid two-user scheduling (HTS) schemes. The proposed schemes are innovative in the sense that they include a second user in the transmission opportunistically using hierarchical modulations. As such the frequency of information access of the users increases without any degradation of the system spectral efficiency (SSE) compared to the classical opportunistic scheduling scheme. In this paper, we analyze channel access delay of an incoming packet at the base station (BS) buffer when our proposed TBS and HTS schemes are employed at the BS. Specifically, using a queuing analytic model we derive channel access delay as well as buffer distribution of the packets that wait at BS buffer for down-link (DL) transmission. We compare performance of the TBS and HTS schemes with that of the classical single user opportunistic schemes namely, absolute carrier-to-noise ratio (CNR)-based single user scheduling (ASS) and normalized CNR-based single user scheduling (NSS). For an independent and identically distributed (i.i.d.) fading environment, our proposed scheme can improve packet\\'s access delay performance compared to the ASS. Selected numerical results in an independent but non-identically distributed (i.n.d.) fading environment show that our proposed HTS achieves overall good channel access delay performance. © 2010 IEEE.
Full Text Available The intention of an authentication and authorization infrastructure (AAI is to simplify and unify access to different web resources. With a single login, a user can access web applications at multiple organizations. The Shibboleth authentication and authorization infrastructure is a standards-based, open source software package for web single sign-on (SSO across or within organizational boundaries. It allows service providers to make fine-grained authorization decisions for individual access of protected online resources. The Shibboleth system is a widely used AAI, but only supports protection of browser-based web resources. We have implemented a Shibboleth AAI extension to protect web services using Simple Object Access Protocol (SOAP. Besides user authentication for browser-based web resources, this extension also provides user and machine authentication for web service-based resources. Although implemented for a Shibboleth AAI, the architecture can be easily adapted to other AAIs.
Shafie, A. E.; Khattab, T.; El-Keyi, A.; Nafie, M.
In this paper, we consider a cognitive scenario where an energy harvesting secondary user shares the spectrum with a primary user. The secondary source helps the primary source in delivering its undelivered packets during periods of silence of the primary source. The primary source has a queue for storing its data packets, whereas the secondary source has two data queues: a queue for storing its own packets and the other for storing the fraction of the undelivered primary packets accepted for...
Gul, Noor; Qureshi, Ijaz Mansoor; Omar, Adnan; Elahi, Atif; Khan, Sajjad
In cognitive radio communication, spectrum sensing plays a vital role in sensing the existence of the primary user (PU). The sensing performance is badly affected by fading and shadowing in case of single secondary user(SU). To overcome this issue, cooperative spectrum sensing (CSS) is proposed. Although the reliability of the system is improved with cooperation but existence of malicious user (MU) in the CSS deteriorates the performance. In this work, we consider the Kullback-Leibler (KL) divergence method for minimizing spectrum sensing data falsification (SSDF) attack. In the proposed CSS scheme, each SU reports the fusion center(FC) about the availability of PU and also keeps the same evidence in its local database. Based on the KL divergence value, if the FC acknowledges the user as normal, then the user will send unified energy information to the FC based on its current and previous sensed results. This method keeps the probability of detection high and energy optimum, thus providing an improvement in performance of the system. Simulation results show that the proposed KL divergence method has performed better than the existing equal gain combination (EGC), maximum gain combination (MGC) and simple KL divergence schemes in the presence of MUs.
Radaydeh, Redha M.
© 2015 IEEE. This paper develops analytical models to investigate the impact of various operation terms and parameters on the downlink performance of spectrum-shared overlaid networks under closed-access small cells deployment. It is considered that closed-access small cells (i.e., femtocells) can not reuse available channels, and can serve only active authorized user equipments (UEs). On the other hand, the macrocell base station can unconditionally reuse available channels to serve active macrocell UEs. The analysis characterizes UEs identities, their likelihoods of being active, and their likelihoods of initiating interference. Moreover, it quantifies interference sources observed from effective femtocells considering their over-loaded and under-loaded cell scenarios. The developed results to characterize an active UE performance and the impact of the number of available channels are thoroughly examined. The obtained results are generally applicable for any performance measure and any network channel models. Numerical and simulation examples are presented to clarify the main outcomes of this paper.
Parsaeefard, Saeedeh; Mokari, Nader
This book presents state-of-the-art research on robust resource allocation in current and future wireless networks. The authors describe the nominal resource allocation problems in wireless networks and explain why introducing robustness in such networks is desirable. Then, depending on the objectives of the problem, namely maximizing the social utility or the per-user utility, cooperative or competitive approaches are explained and their corresponding robust problems are considered in detail. For each approach, the costs and benefits of robust schemes are discussed and the algorithms for reducing their costs and improving their benefits are presented. Considering the fact that such problems are inherently non-convex and intractable, a taxonomy of different relaxation techniques is presented, and applications of such techniques are shown via several examples throughout the book. Finally, the authors argue that resource allocation continues to be an important issue in future wireless networks, and propose spec...
Wang, Ying; Zhang, Ping
This SpringerBrief presents research results on QoE management schemes for mobile services, including user services, and resource allocation. Along with a review of the research literature, it offers a data-driven architecture for personalized QoE management in wireless networks. The primary focus is on introducing efficient personalized character extraction mechanisms, e.g., context-aware Bayesian graph model, and cooperative QoE management mechanisms. Moreover, in order to demonstrate in the effectiveness of the QoE model, a QoE measurement platform is described and its collected data examined. The brief concludes with a discussion of future research directions. The example mechanisms and the data-driven architecture provide useful insights into the designs of QoE management, and motivate a new line of thinking for users' satisfaction in future wireless networks.
Mahmood, Nurul Huda
In wireless systems where transmitters are subject to a strict received power constraint, such as in underlay cognitive radio networks, cooperative communication is a promising strategy to enhance network performance, as it helps to improve the coverage area and outage performance of a network. However, this comes at the expense of increased resource utilization. To balance the performance gain against the possible over-utilization of resources, we propose a hybrid-cooperation technique for underlay cognitive radio networks, where secondary users cooperate only when required. Various performance measures of the proposed hybrid-cooperation technique are analyzed in this paper, and are also further validated numerically. © 2012 IEEE.
Hubenko, Jr, Victor P
With the Information Age in full and rapid development, users expect to have global, seamless, ubiquitous, secure, and efficient communications capable of providing access to real-time applications and collaboration...
Wireless communication technologies provide users with significant flexibility and portability and hence is being widely adopted as a preferred mode of communication in many military and civilian applications...
In July 2002, the U.S. Department of Energy's Industrial Technologies Program sponsored the Industrial Wireless Workshop as a forum for articulating some long-term goals that may help guide the development of industrial wireless sensor systems. Over 30 individuals, representing manufacturers and suppliers, end users, universities, and national laboratories, attended the workshop in San Francisco and participated in a series of facilitated sessions. The workshop participants cooperatively developed a unified vision for the future and defined specific goals and challenges. This document presents the results of the workshop as well as some context for non-experts.
Zhou, ZhangBing; Zhao, Deng; Shu, Lei; Tsang, Kim-Fung
Wireless sensor networks, serving as an important interface between physical environments and computational systems, have been used extensively for supporting domain applications, where multiple-attribute sensory data are queried from the network continuously and periodically. Usually, certain sensory data may not vary significantly within a certain time duration for certain applications. In this setting, sensory data gathered at a certain time slot can be used for answering concurrent queries and may be reused for answering the forthcoming queries when the variation of these data is within a certain threshold. To address this challenge, a popularity-based cooperative caching mechanism is proposed in this article, where the popularity of sensory data is calculated according to the queries issued in recent time slots. This popularity reflects the possibility that sensory data are interested in the forthcoming queries. Generally, sensory data with the highest popularity are cached at the sink node, while sensory data that may not be interested in the forthcoming queries are cached in the head nodes of divided grid cells. Leveraging these cooperatively cached sensory data, queries are answered through composing these two-tier cached data. Experimental evaluation shows that this approach can reduce the network communication cost significantly and increase the network capability. PMID:26131665
a sug gestion that the item at the link tail should be presented before the it em at the link head. This may well be accompanied by verbal...database. Cognoter is an attempt to circumvent the usual t um-taking by allowing users to act simultaneously. Participants at persona l workstations
Devereaux, Ann (Inventor); Jedrey, Thomas (Inventor); Agan, Martin (Inventor)
A portable unit is for video communication to select a user name in a user name network. A transceiver wirelessly accesses a communication network through a wireless connection to a general purpose node coupled to the communication network. A user interface can receive user input to log on to a user name network through the communication network. The user name network has a plurality of user names, at least one of the plurality of user names is associated with a remote portable unit, logged on to the user name network and available for video communication.
In this thesis, we investigate the independent but not identically distributed (i.n.i.d.) situations for spectrum sensing and data transmission. In particular, we derive the false-alarm probability and the detection probability of cooperative spectrum sensing with the scheme of energy fusion over i.n.i.d. Nakagami fading channels. Then, the performance of adaptive modulation with single-cell multiuser scheduling over i.n.i.d. Nakagami fading channels is analyzed. Closed-form expressions are derived for the average channel capacity, spectral efficiency, and bit-error-rate (BER) for both constant-power variable-rate and variable-power variable-rate uncoded M- ary quadrature amplitude modulation (M-QAM) schemes. In addition, we study the impact of time delay on the average BER of adaptive M-QAM. From the selected numerical results, we can see that cooperative spectrum sensing and multiuser diversity brings considerably better performance even over i.n.i.d. fading environments.
Ogawa, Masakatsu; Hiraguri, Takefumi; Nishimori, Kentaro; Takaya, Kazuhiro; Murakawa, Kazuo
This paper proposes and investigates a distributed adaptive contention window adjustment algorithm based on the transmission history for wireless LANs called the transmission-history-based distributed adaptive contention window adjustment (THAW) algorithm. The objective of this paper is to reduce the transmission delay and improve the channel throughput compared to conventional algorithms. The feature of THAW is that it adaptively adjusts the initial contention window (CWinit) size in the binary exponential backoff (BEB) algorithm used in the IEEE 802.11 standard according to the transmission history and the automatic rate fallback (ARF) algorithm, which is the most basic algorithm in automatic rate controls. This effect is to keep CWinit at a high value in a congested state. Simulation results show that the THAW algorithm outperforms the conventional algorithms in terms of the channel throughput and delay, even if the timer in the ARF is changed.
Costongs, G M; Janson, P C
Achievement of appropriate precision is a major challenge for the clinical laboratory, particularly in specialized fields such as enzymology and immunochemistry. Especially in immunochemistry, where accuracy can only poorly be checked because of a lack of reference methods and a multitude of detectable epitopes, precision remains an important index of quality. In immunochemical methods there are three main sources of variation: differences in methodology, lot-to-lot variation and performance of the assay, the latter including the skill of the technicians and instrument performance. The results of a European Quality Control Programme for the users of one type of automated immunoassay analyser were compared with a similar Italian Quality Control Programme for users of different immunometric techniques. The precisions (%CV) of the two programmes were compared, as well as the number of values lying within one half of the biological variation of the analysed serum components. Feedback between users and manufacturers leads to a clear improvement in analysis performance, so that most of the considered values come to lie within the acceptable limits of 1/2 of the biological variation. It is concluded that both national and international quality control programmes are very useful for indicating the intrinsic quality of the quantities used in the clinical laboratory.
Parrish, William J; Tovar, Daniel R
This thesis will focus on the area of 802.20 wireless networking as a feasible "last mile" solution to wireless access in a tactical coalition environment and will be implemented into a series of experiments...
ability of wireless sensor networks to operate cooperatively in an environment that includes wireless LANs, wireless headsets, RF heating, wireless crane controls and many other users of the electromagnetic spectrum will probably be the most important issue we can address. A network of units (Figure 1) has been developed that demonstrates the feasibility of direct-sequence spread spectrum wireless sensor networking for industrial environments. The hardware consists of a group of reprogrammable transceivers that can act as sensor nodes or network nodes or both. These units and the team that built them are the heart of a test bed development system that has been used successfully in demonstrations at various industrial sites. As previously reported, these units have been successfully tested at a paper mill. More recently, these units were utilized in a permanent installation at a steel mill. Both of these applications demonstrated the ease with which a new network could be installed, and the reality that DSSS units can operate successfully in plants where narrow band transmitters had previously caused interference with plant operations.
Morhart, C.; Biebl, E. M.
We present an improved approach for a Round Trip Time of Flight distance measurement system. The system is intended for the usage in a cooperative localisation system for automotive applications. Therefore, it is designed to address a large number of communication partners per measurement cycle. By using coded signals in a time divison multiple access order, we can detect a large number of pedestrian sensors with just one car sensor. We achieve this by using very short transmit bursts in combination with a real time correlation algorithm. Futhermore, the correlation approach offers real time data, concerning the time of arrival, that can serve as a trigger impulse for other comunication systems. The distance accuracy of the correlation result was further increased by adding a fourier interpolation filter. The system performance was checked with a prototype at 2.4 GHz. We reached a distance measurement accuracy of 12 cm at a range up to 450 m.
Full Text Available We present an improved approach for a Round Trip Time of Flight distance measurement system. The system is intended for the usage in a cooperative localisation system for automotive applications. Therefore, it is designed to address a large number of communication partners per measurement cycle. By using coded signals in a time divison multiple access order, we can detect a large number of pedestrian sensors with just one car sensor. We achieve this by using very short transmit bursts in combination with a real time correlation algorithm. Futhermore, the correlation approach offers real time data, concerning the time of arrival, that can serve as a trigger impulse for other comunication systems. The distance accuracy of the correlation result was further increased by adding a fourier interpolation filter. The system performance was checked with a prototype at 2.4 GHz. We reached a distance measurement accuracy of 12 cm at a range up to 450 m.
Parkkinen, R.; Jarvinen, H.
For the optimization of medical exposure in special radiological practices like in paediatric radiology, orthopaedics and cardiology, the Radiation and Nuclear Safety Authority (S.T.U.K.) in Finland has used a six step model to achieve the aims of the Medical Exposure Directive (97/43/EURATOM). The basis is to introduce the regulation and to meet the needs of the users for education and training. The aim is to educate some specialists to distribute information and good practices among their own professional groups. S.T.U.K. makes continuous verification on site visits and improves the process. (authors)
Zhao, Wei; Tang, Zhenmin; Yang, Yuwang; Wang, Lei; Lan, Shaohua
This paper presents a searching control approach for cooperating mobile sensor networks. We use a density function to represent the frequency of distress signals issued by victims. The mobile nodes' moving in mission space is similar to the behaviors of fish-swarm in water. So, we take the mobile node as artificial fish node and define its operations by a probabilistic model over a limited range. A fish-swarm based algorithm is designed requiring local information at each fish node and maximizing the joint detection probabilities of distress signals. Optimization of formation is also considered for the searching control approach and is optimized by fish-swarm algorithm. Simulation results include two schemes: preset route and random walks, and it is showed that the control scheme has adaptive and effective properties. PMID:24741341
Cao, Bin; Zhao, Jianwei; Yang, Po
Using immune algorithms is generally a time-intensive process especially for problems with a large number of variables. In this paper, we propose a distributed parallel cooperative coevolutionary multi-objective large-scale immune algorithm that is implemented using the message passing interface...... number of variables are divided into several groups. Finally, individual evaluations are allocated across many core processing units, and calculations are performed in parallel. Consequently, the computation time is greatly reduced. The proposed algorithm integrates the idea of immune algorithms, which...... (MPI). The proposed algorithm is composed of three layers: objective, group and individual layers. First, for each objective in the multi-objective problem to be addressed, a subpopulation is used for optimization, and an archive population is used to optimize all the objectives. Second, the large...
Yang, Jie; Trappe, Wade; Cheng, Jerry
This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method. This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sen
Mahmood, Nurul Huda; Yilmaz, Ferkan; Øien, Geir E.
of opportunistic wireless systems such as cognitive radio networks. In order to balance the performance gains from cooperative communication against the possible over-utilization of resources, we propose and analyze an adaptive-cooperation technique for underlay cognitive radio networks, termed as hybrid......-cooperation. Under the proposed cooperation scheme, secondary users in a cognitive radio network cooperate adaptively to enhance the spectral efficiency and the error performance of the network. The bit error rate, the spectral efficiency and the outage performance of the network under the proposed hybrid......Cooperative communication is a promising strategy to enhance the performance of a communication network as it helps to improve the coverage area and the outage performance. However, such enhancement comes at the expense of increased resource utilization, which is undesirable; more so in the case...
Kotamäki, Niina; Thessler, Sirpa; Koskiaho, Jari; Hannukkala, Asko O; Huitu, Hanna; Huttula, Timo; Havento, Jukka; Järvenpää, Markku
Sensor networks are increasingly being implemented for environmental monitoring and agriculture to provide spatially accurate and continuous environmental information and (near) real-time applications. These networks provide a large amount of data which poses challenges for ensuring data quality and extracting relevant information. In the present paper we describe a river basin scale wireless sensor network for agriculture and water monitoring. The network, called SoilWeather, is unique and the first of this type in Finland. The performance of the network is assessed from the user and maintainer perspectives, concentrating on data quality, network maintenance and applications. The results showed that the SoilWeather network has been functioning in a relatively reliable way, but also that the maintenance and data quality assurance by automatic algorithms and calibration samples requires a lot of effort, especially in continuous water monitoring over large areas. We see great benefits on sensor networks enabling continuous, real-time monitoring, while data quality control and maintenance efforts highlight the need for tight collaboration between sensor and sensor network owners to decrease costs and increase the quality of the sensor data in large scale applications.
The WLAN security includes Wired Equivalent Primary WEP and WI-FI protected Access WPA. Today WEP is regarded as very poor security standard. WEP was regarded as very old security standard and has many security issues which users need to be addressed. In this Paper we will discuss Wireless Security and ways to improve on wireless security.
Full Text Available This paper advocates a novel approach for mobile web browsing based on cooperation among wireless devices within close proximity operating in a cellular environment. In the actual state of the art, mobile phones can access the web using different cellular technologies. However, the supported data rates are not sufficient to cope with the ever increasing traffic requirements resulting from advanced and rich content services. Extending the state of the art, higher data rates can only be achieved by increasing complexity, cost, and energy consumption of mobile phones. In contrast to the linear extension of current technology, we propose a novel architecture where mobile phones are grouped together in clusters, using a short-range communication such as Bluetooth, sharing, and accumulating their cellular capacity. The accumulated data rate resulting from collaborative interactions over short-range links can then be used for cooperative mobile web browsing. By implementing the cooperative web browsing on commercial mobile phones, it will be shown that better performance is achieved in terms of increased data rate and therefore reduced access times, resulting in a significantly enhanced web browsing user experience on mobile phones.
Facilitating Cooperation for Wireless Systems Cooperative Communications: Hardware, Channel & PHY focuses on issues pertaining to the PHY layer of wireless communication networks, offering a rigorous taxonomy of this dispersed field, along with a range of application scenarios for cooperative and distributed schemes, demonstrating how these techniques can be employed. The authors discuss hardware, complexity and power consumption issues, which are vital for understanding what can be realized at the PHY layer, showing how wireless channel models differ from more traditional
Full Text Available Energy saving becomes critical in modern cloud wireless multimedia and mobile communication systems. In this paper we propose to study a new paradigm named application layer Position-Value diversity for wireless image sharing for cloud-edge communications, which has significant energy saving potentials for modern wireless networking systems. In this new paradigm, saving energy is achieved by looking into application layer imaging traffic, in stead of MAC-PHY protocols at lower layers, and partitioning it into important positions and unimportant values. This paradigm could be integrated to existing wavelet-based tree compression, and truncation of image bit streams could be performed with regards to wireless communication energy budget estimation. Simulation results demonstrated that there are significant potentials of communication energy efficiency gain and Quality of Experience (QoE enhancement in wireless image communication systems.
Ngobeni, Sipho; Venter, Hein; Burke, Ivan
International audience; Over the past decade, wireless mobile communications technology based on IEEE 802.11 wireless local area networks (WLANs) has been adopted worldwide on a massive scale. However, as the number of wireless users has soared, so has the possibility of cyber crime, where criminals deliberately and actively break into WLANs with the intent to cause harm or access sensitive information. WLAN digital forensics is seen not only as a response to cyber crime in wireless environme...
First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.
Wee, B.; Car, N.; Percivall, G.; Allen, D.; Fitch, P. G.; Baumann, P.; Waldmann, H. C.
The Belmont Forum E-Infrastructure and Data Management Cooperative Research Agreement (CRA) is designed to foster a global community to collaborate on e-infrastructure challenges. One of the deliverables is an implementation plan to address global data infrastructure interoperability challenges and align existing domestic and international capabilities. Work package three (WP3) of the CRA focuses on the harmonization of global data infrastructure for sharing environmental data. One of the subtasks under WP3 is the development of user scenarios that guide the development of applicable deliverables. This paper describes the proposed protocol for user scenario development. It enables the solicitation of user scenarios from a broad constituency, and exposes the mechanisms by which those solicitations are evaluated against requirements that map to the Belmont Challenge. The underlying principle of traceability forms the basis for a structured, requirements-driven approach resulting in work products amenable to trade-off analyses and objective prioritization. The protocol adopts the ISO Reference Model for Open Distributed Processing (RM-ODP) as a top level framework. User scenarios are developed within RM-ODP's "Enterprise Viewpoint". To harmonize with existing frameworks, the protocol utilizes the conceptual constructs of "scenarios", "use cases", "use case categories", and use case templates as adopted by recent GEOSS Architecture Implementation Project (AIP) deliverables and CSIRO's eReefs project. These constructs are encapsulated under the larger construct of "user scenarios". Once user scenarios are ranked by goodness-of-fit to the Belmont Challenge, secondary scoring metrics may be generated, like goodness-of-fit to FutureEarth science themes. The protocol also facilitates an assessment of the ease of implementing given user scenario using existing GEOSS AIP deliverables. In summary, the protocol results in a traceability graph that can be extended to coordinate
Vitetta, Giorgio; Colavolpe, Giulio; Pancaldi, Fabrizio; Martin, Philippa A
This book introduces the theoretical elements at the basis of various classes of algorithms commonly employed in the physical layer (and, in part, in MAC layer) of wireless communications systems. It focuses on single user systems, so ignoring multiple access techniques. Moreover, emphasis is put on single-input single-output (SISO) systems, although some relevant topics about multiple-input multiple-output (MIMO) systems are also illustrated.Comprehensive wireless specific guide to algorithmic techniquesProvides a detailed analysis of channel equalization and channel coding for wi
An authoritative collection of research papers and surveys, Emerging Wireless Networks: Concepts, Techniques, and Applications explores recent developments in next-generation wireless networks (NGWNs) and mobile broadband networks technologies, including 4G (LTE, WiMAX), 3G (UMTS, HSPA), WiFi, mobile ad hoc networks, mesh networks, and wireless sensor networks. Focusing on improving the performance of wireless networks and provisioning better quality of service and quality of experience for users, it reports on the standards of different emerging wireless networks, applications, and service fr
Fitzek, Frank H. P.; Katz, Marcos; Zhang, Qi
This article advocates a novel communication architecture and associated collaborative framework for future wireless communication systems. In contrast to the dominating cellular architecture and the upcoming peer-to-peer architecture, the new approach envisions a cellular controlled short-range ...... to establish cooperation with them. The novel architecture together with several possible cooperative strategies will bring clear benefits for the network and service providers, mobile device manufacturers and also end users.......-range communication network among cooperating mobile and wireless devices. The role of the mobile device will change, from being an agnostic entity in respect to the surrounding world to a cognitive device. This cognitive device is capable of being aware of the neighboring devices as well as on the possibility...
Cosmanescu, Alin; Miller, Benjamin; Magno, Terence; Ahmed, Assad; Kremenic, Ian
A portable, multi-purpose Bio-instrumentation Amplifier and Data AcQuisition device (BADAQ) capable of measuring and transmitting EMG and EKG signals wirelessly via Bluetooth is designed and implemented. Common topologies for instrumentation amplifiers and filters are used and realized with commercially available, low-voltage, high precision operational amplifiers. An 8-bit PIC microcontroller performs 10-bit analog-to-digital conversion of the amplified and filtered signals and controls a Bluetooth transceiver capable of wirelessly transmitting the data to any Bluetooth enabled device. Electrical isolation between patient/subject, circuitry, and ancillary equipment is achieved by optocoupling components. The design focuses on simplicity, portability, and affordability.
Mahmood, Nurul Huda
Cooperative communication is a promising strategy to enhance the performance of a communication network as it helps to improve the coverage area and the outage performance. However, such enhancement comes at the expense of increased resource utilization, which is undesirable; more so in the case of opportunistic wireless systems such as cognitive radio networks. In order to balance the performance gains from cooperative communication against the possible over-utilization of resources, we propose and analyze an adaptive-cooperation technique for underlay cognitive radio networks, termed as hybrid-cooperation. Under the proposed cooperation scheme, secondary users in a cognitive radio network cooperate adaptively to enhance the spectral efficiency and the error performance of the network. The bit error rate, the spectral efficiency and the outage performance of the network under the proposed hybrid cooperation scheme with amplify-and-forward relaying are analyzed in this paper, and compared against conventional cooperation technique. Findings of the analytical performance analyses are further validated numerically through selected computer-based Monte-Carlo simulations. The proposed scheme is found to achieve significantly better performance in terms of the spectral efficiency and the bit error rate, compared to the conventional amplify-and-forward cooperation scheme. © 2013 IEEE.
Full Text Available Cognitive radio (CR is a technology to implement opportunistic spectrum sharing to improve the spectrum utilization. However, there exists a hidden-node problem, which can be a big challenge to solve especially when the primary receiver is passive listening. We aim to provide a solution to the hidden-node problem for passive-listening receiver based on cooperation of multiple CRs. Specifically, we consider a cooperative GPS-enabled cognitive network. Once the existence of PU is detected, a localization algorithm will be employed to first estimate the path loss model for the environment based on backpropagation method and then to locate the position of PU. Finally, a disable region is identified taking into account the communication range of both the PU and the CR. The CRs within the disabled region are prohibited to transmit in order to avoid interfering with the primary receiver. Both analysis and simulation results are provided.
Rahimi, Maryam; De Carvalho, Elisabeth; Pedersen, Gert Frølund
This paper presents an investigation on the behavior of wireless channels in a realistic propagation environment, while cooperation between base stations (BSs) was assumed. Two different scenarios for cooperation were considered in this work. In semi cooperation case, the knowledge of channel state...... information (CSI) is shared between base stations, but the data is available at each BS locally. In the second state, which is called full cooperation, data and CSI are available at both BSs. The measurements were done by implementing two separate base stations in different locations from users. One base...... station has 6 and the other one has one antennas. At each measurement time 4 handsets are under test, when each handset has 2 antennas. The measurements were done simultaneously from both BSs to 4 users. Minimum mean square error (MMSE) beamforming criteria was applied as a transmission technique...
Chilamkurti, Naveen; Chaouchi, Hakima
This comprehensive text/reference examines the various challenges to secure, efficient and cost-effective next-generation wireless networking. Topics and features: presents the latest advances, standards and technical challenges in a broad range of emerging wireless technologies; discusses cooperative and mesh networks, delay tolerant networks, and other next-generation networks such as LTE; examines real-world applications of vehicular communications, broadband wireless technologies, RFID technology, and energy-efficient wireless communications; introduces developments towards the 'Internet o
Wen, Heming; Le-Ngoc, Tho
This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless technologies by summarizing and comparing different architectures, techniques and technologies applicable to a future virtualized wireless network infrastructure. The readers are exposed to a short walkthrough of the future Internet initiative and network virtualization technologies in order to understand the potential role of wireless virtualization in the broader context of next-generation ubiq
Full Text Available In this paper we developed a computer based wireless advertising communication system (CBWACS that enables the user to advertise whatever he wants from his own office to the screen in front of the customer via wireless communication system. This system consists of two PIC microcontrollers, transmitter, receiver, LCD, serial cable and antenna. The main advantages of the system are: the wireless structure and the system is less susceptible to noise and other interferences because it uses digital communication techniques.
el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.
This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and
In this contribution, two-way cooperative amplify-and-forward (AF) relaying technique is integrated into spectrumsharing wireless systems to improve spectral efficiency of secondary users (SUs). In order to share the available spectrum resources originally dedicated to primary users (PUs), the transmit power of a SU is optimized with respect to the average tolerable interference power at primary receivers. By analyzing outage probability and achievable data rate at the base station and at a cell-edge SU, our results reveal that the uplink performance is dominated by the average tolerable interference power at primary receivers, while the downlink always behaves like conventional one-way AF relaying and its performance is dominated by the average signal-to-noise ratio (SNR). These important findings provide fresh perspectives for system designers to improve spectral efficiency of secondary users in next-generation broadband spectrum-sharing wireless systems. © 2012 IEEE.
Niemeier, J. J.; Davies, J. L.; Kruger, A.
Conventional thinking holds that underground- and underwater radio communication is not possible, except at very low frequencies employing very long antennas and high transmit power. However, researchers at The University of Iowa have demonstrated that using inexpensive, low-power radios, it is in fact possible to achieve reliable underground radio communication over distances of several meters. This allows for creating underground wireless sensor networks. A proof-of-concept network was established at The University of Iowa, where nodes that measure soil moisture content are buried over a 20×20 m area (up to 1 m deep). The nodes organize themselves into a wireless sensor network, reconfigure routes as radio link quality waxes and wanes, cooperate in routing data packets to a surface base station, and so on. In an agricultural research setting, an advantage of such buried wireless sensor networks is that, if nodes were buried deep enough, they may be left in place during agricultural field work. Power consumption is an important issue in wireless sensor networks. This is especially true in a buried network where battery replacement is a major undertaking. The focus of continuing research is developing methods of inductively recharging buried sensor batteries.
Full Text Available Over the past decade, wireless mobile communications technology based on IEEE 802.11 wireless local area networks (WLANs) has been adopted worldwide on a massive scale. However, as the number of wireless users has soared, so has the possibility...
Shadi R. Masadeh; Nidal Turab
Information security is a critical issue in the wireless network, because the transmission media is open (no physical control on the air). Any wireless device equipped with wireless interface can use and share the airwave transmission medium with other users. For protection purposes, several security mechanisms have been developed over years. This paper provides systematic evaluation of different security schemes used in wireless networks: WEP, TKIP, WPA, AES and WPA2. A formal comparison is ...
Hsu, Wei-jen; Dutta, Debojyoti; Helmy, Ahmed
One vision of future wireless networks is that they will be deeply integrated and embedded in our lives and will involve the use of personalized mobile devices. User behavior in such networks is bound to affect the network performance. It is imperative to study and characterize the fundamental structure of wireless user behavior in order to model, manage, leverage and design efficient mobile networks. It is also important to make such study as realistic as possible, based on extensive measure...
Full Text Available With the increasing demands for better transmission speed and robust quality of service (QoS, the capacity constrained backhaul gradually becomes a bottleneck in cooperative wireless networks, e.g., in the Internet of Things (IoT scenario in joint processing mode of LTE-Advanced Pro. This paper focuses on resource allocation within capacity constrained backhaul in uplink cooperative wireless networks, where two base stations (BSs equipped with single antennae serve multiple single-antennae users via multi-carrier transmission mode. In this work, we propose a novel cooperative transmission scheme based on compress-and-forward with user pairing to solve the joint mixed integer programming problem. To maximize the system capacity under the limited backhaul, we formulate the joint optimization problem of user sorting, subcarrier mapping and backhaul resource sharing among different pairs (subcarriers for users. A novel robust and efficient centralized algorithm based on alternating optimization strategy and perfect mapping is proposed. Simulations show that our novel method can improve the system capacity significantly under the constraint of the backhaul resource compared with the blind alternatives.
Perrucci, GP; Fitzek, FHP; Zhang, Qi
This paper advocates a novel approach for mobile web browsing based on cooperation among wireless devices within close proximity operating in a cellular environment. In the actual state of the art, mobile phones can access the web using different cellular technologies. However, the supported data......-range links can then be used for cooperative mobile web browsing. By implementing the cooperative web browsing on commercial mobile phones, it will be shown that better performance is achieved in terms of increased data rate and therefore reduced access times, resulting in a significantly enhanced web...
Full Text Available Background: It is necessary to deploy mobile and wireless systems in healthcare, because they have many benefits for healthcare systems. The objectives of this article were introducing various systems, applications, and standards of the wireless and mobile telemedicine. Material and Methods: This review study was conducted in 2010. To conduct the study, published articles in the years 2005 to 2012, in English with an emphasis on wireless and mobile technologies in health were studied. Search was done with key words include telemedicine, wireless health systems, health and telecommunications technology in databases including Pubmed, Science Direct, Google Scholar, Web of Sciences, Proquest. The collected data were analyzed. Results: Telemedicine system in the ambulance, telemedicine systems in space, telecardiology systems, EEG system, ultrasound system are some types of wireless and mobile systems in telemedicine. PDA-based mobile and wireless telemedicine application, based PDA drug application, and patient tracking application are some of wireless and mobile applications of telemedicine. The most important standards of wireless and mobile telemedicine are HL7, DICOM, SNOMed, and ICD-9-CM. Conclusion: There are many challenges in the wireless and mobile systems in telemedicine, despite the many benefits. Slow speed in sending pictures and video, lack of attention to the privacy in the design of these systems, environmental variables and the number of users during the day are some of these challenges. It is recommended to consider these challenges during the planning and designing of wireless and mobile systems in telemedicine.
Pang, Xiaodan; Beltrán, Marta; Sánchez, José
We propose and experimentally demonstrate an optical wireless DWDM system at 60 GHz with optical incoherent heterodyne up-conversion using an optical frequency comb. Multiple users with wireline and wireless services are simultaneously supported.......We propose and experimentally demonstrate an optical wireless DWDM system at 60 GHz with optical incoherent heterodyne up-conversion using an optical frequency comb. Multiple users with wireline and wireless services are simultaneously supported....
Nielsen, Karsten Fyhn; Madsen, Tatiana Kozlova; Fitzek, Frank
Wireless grids have potential in sharing communication, computational and storage resources making these networks more powerful, more robust, and less cost intensive. However, to enjoy the benefits of cooperative resource sharing, a number of issues should be addressed and the cost of the wireles...... implementation demonstrates the feasibility of network coding for wireless grids formed by mobile devices....
Saugstrup, Dan; Henten, Anders
The main purpose of this report is to spell out a methodological approach to the analysis of user needs with respect to mobility. Furthermore, this methodological approach is used in an exemplary analysis of the relationship between user needs and technology solutions offered by different wireless...... technologies. The report is based on a research approach, emphasizing important aspects in relation to developing more user oriented mobile services and applications in a heterogeneous network environment. As a staring point, Scandinavian research within the field of social science concerning mobility...... is described and discussed. Furthermore different wireless technologies are briefly described and discussed in relation to possible transmission capacities and coverage areas. In addition to this, a preliminary framework regarding the implications of mobility on the use and development of mobile services...
Yet another advent of cooperative transmission is exposed in this letter. It is shown that cooperation lends itself to the reduction of buffer sizes of wireless sensor nodes. It is less likely to find the channel busy when cooperative transmission is employed in the network. Otherwise, in the lack of cooperation, the probability of build up of packet queues in transmission buffers increases.
Bailey, Timothy S; Wallace, Jane F; Pardo, Scott; Warchal-Windham, Mary Ellen; Harrison, Bern; Morin, Robert; Christiansen, Mark
The new Contour ® Plus ONE blood glucose monitoring system (BGMS) features an easy-to-use, wireless-enabled blood glucose meter that links to a smart mobile device via Bluetooth ® connectivity and can sync with the Contour ™ Diabetes app on a smartphone or tablet. The accuracy of the new BGMS was assessed in 2 studies according to ISO 15197:2013 criteria. In Study 1 (laboratory study), fingertip capillary blood samples from 100 subjects were tested in duplicate using 3 test strip lots. In Study 2 (clinical study), 134 subjects with type 1 or type 2 diabetes enrolled at 2 clinical sites. BGMS results and YSI analyzer (YSI) reference results were compared for fingertip blood obtained by untrained subjects' self-testing and for study staff-obtained fingertip, subject palm, and venous results. In Study 1, 99.0% (594/600) of combined results for all 3 test strip lots fulfilled ISO 15197:2013 Section 6.3 accuracy criteria. In Study 2, 99.2% (133/134) of subject-obtained capillary fingertip results, 99.2% (133/134) of study staff-obtained fingertip results, 99.2% (125/126) of subject-obtained palm results, and 100% (132/132) of study staff-obtained venous results met ISO 15197:2013 Section 8 accuracy criteria. Moreover, 95.5% (128/134) of subject-obtained fingertip self-test results were within ±10 mg/dl (±0.6 mmol/L) or ±10% of the YSI reference result. Questionnaire results showed that most subjects found the BGMS easy to use. The BGMS exceeded ISO 15197:2013 accuracy criteria both in the laboratory and in a clinical setting when used by untrained subjects with diabetes.
Full Text Available This article deals with the impact of Wireless (Wi-Fi networks on the perceived quality of voice services. The Quality of Service (QoS metrics must be monitored in the computer network during the voice data transmission to ensure proper voice service quality the end-user has paid for, especially in the wireless networks. In addition to the QoS, research area called Quality of Experience (QoE provides metrics and methods for quality evaluation from the end-user’s perspective. This article focuses on a QoE estimation of Voice over IP (VoIP calls in the wireless networks using network simulator. Results contribute to voice quality estimation based on characteristics of the wireless network and location of a wireless client.
This work represents a milestone for the? 'ULOOP User-centric Wireless Local Loop' project funded by the EU IST Seventh Framework Programme.ULOOP is focused on the robust, secure, and autonomic deployment of user-centric wireless networks. Contributions by ULOOP partners as well as invited tutorials by international experts in the field. The expected impact is to increase awareness to user-centric networking in terms, e.g., of business opportunities and quality of experience, and to present adequate technology to sustain the growth of user-friendly wireless architectures.Throughout the last 3
Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee
The convergence of different types of traffic has preceded the convergence of systems and services in a wireless heterogeneous network. Voice and data traffic are usually treated separate in both 2G and 2.5G wireless networks. With advances in packet switching technology and especially with the d...... and to the discruption caused by the user mobility during the session. Voice over IP in Wireless Hetetrogeneous Networks thus investigates and proposes cross-layer techniques for realizing time-efficient control mechanisms for VoIP: signaling, mobility and security.......The convergence of different types of traffic has preceded the convergence of systems and services in a wireless heterogeneous network. Voice and data traffic are usually treated separate in both 2G and 2.5G wireless networks. With advances in packet switching technology and especially...... with the deployment of wireless heterogeneous systems, both speech and data traffic are carrried over wireless links by the same IP-based packet-switched infrastructure. However, this combination faces some challenges due to the inherent properties of the wireless network. The requirements for good quality Vo...
Devereaux, Ann (Inventor); Jedrey, Thomas (Inventor); Agan, Martin (Inventor)
The system of the present invention is a highly integrated radio communication system with a multimedia co-processor which allows true two-way multimedia (video, audio, data) access as well as real-time biomedical monitoring in a pager-sized portable access unit. The system is integrated in a network structure including one or more general purpose nodes for providing a wireless-to-wired interface. The network architecture allows video, audio and data (including biomedical data) streams to be connected directly to external users and devices. The portable access units may also be mated to various non-personal devices such as cameras or environmental sensors for providing a method for setting up wireless sensor nets from which reported data may be accessed through the portable access unit. The reported data may alternatively be automatically logged at a remote computer for access and viewing through a portable access unit, including the user's own.
Full Text Available We have identified new services intended for users and administrators of community wireless networks. Troubleshooting assistance services will assist the users during solution of communication problems, gathering data for expert analysis, informing the user about the state of the network (including outages, and so forth. Network administrators will be provided with a unique tool supporting the network analysis, operation, and development. We have mainly focused on the use cases and prerequirements—the problem of topology discovery.
Wang, Tianyu; Saad, Walid; Han, Zhu
This brief introduces overlapping coalition formation games (OCF games), a novel mathematical framework from cooperative game theory that can be used to model, design and analyze cooperative scenarios in future wireless communication networks. The concepts of OCF games are explained, and several algorithmic aspects are studied. In addition, several major application scenarios are discussed. These applications are drawn from a variety of fields that include radio resource allocation in dense wireless networks, cooperative spectrum sensing for cognitive radio networks, and resource management for crowd sourcing. For each application, the use of OCF games is discussed in detail in order to show how this framework can be used to solve relevant wireless networking problems. Overlapping Coalition Formation Games in Wireless Communication Networks provides researchers, students and practitioners with a concise overview of existing works in this emerging area, exploring the relevant fundamental theories, key techniqu...
Wireless Emergency Alerts Commercial Mobile Service Provider (CMSP) Cybersecurity Guidelines Christopher Alberts Audrey Dorofee Carol Woody...Technology Direc- torate. The WEA capability provides a valuable service , disseminating emergency alerts to users of capable mobile devices if they are... mobile service providers (CMSPs)—commercial wireless carriers that broadcast WEA messages to a designated geographic area 4. Alert recipients—the
Over the last couple of decades, wireless communication has proved to be a phenomenal success and has generated a booming industry with over 5 billion mobile handsets in use worldwide. This has on one end eased the life of its users while on the other end has introduced new challenges for wireless
The development of wireless biological electronic sensors could open up significant advances for both fundamental studies and practical applications in a variety of areas, including medical diagnosis, environmental monitoring, and defense applications. One of the major challenges in the development of wireless bioelectronic sensors is the successful integration of biosensing units and wireless signal transducers. In recent years, there are a few types of wireless communication systems that have been integrated with biosensing systems to construct wireless bioelectronic sensors. To successfully construct wireless biological electronic sensors, there are several interesting questions: What types of biosensing transducers can be used in wireless bioelectronic sensors? What types of wireless systems can be integrated with biosensing transducers to construct wireless bioelectronic sensors? How are the electrical sensing signals generated and transmitted? This review will highlight the early attempts to address these questions in the development of wireless biological electronic sensors.
This book, written by experts from universities and major industrial research laboratories, is devoted to the very hot topic of cognitive radio and networking for cooperative coexistence of heterogeneous wireless networks. Selected highly relevant advanced research is presented on spectrum sensing and progress toward the realization of accurate radio environment mapping, biomimetic learning for self-organizing networks, security threats (with a special focus on primary user emulation attack), and cognition as a tool for green next-generation networks. The research activities covered include work undertaken within the framework of the European COST Action IC0902, which is geared towards the definition of a European platform for cognitive radio and networks. Communications engineers, R&D engineers, researchers, and students will all benefit from this complete reference on recent advances in wireless communications and the design and implementation of cognitive radio systems and networks.
Next generation wireless networks are expected to provide high data rate and satisfy the Quality-of-Service (QoS) constraints of the users. A significant component of achieving these goals is to increase the effi ciency of wireless networks by either optimizing current architectures or exploring new technologies which achieve that. The latter includes revisiting technologies which were previously proposed, but due to a multitude of reasons were ignored at that time. One such technology is relaying which was initially proposed in the latter half of the 1960s and then was revived in the early 2000s. In this dissertation, we study relaying in conjunction with resource allocation to increase the effi ciency of wireless networks. In this regard, we differentiate between conventional relaying and relaying with buffers. Conventional relaying is traditional relaying where the relay forwards the signal it received immediately. On the other hand, in relaying with buffers or buffer-aided relaying as it is called, the relay can store received data in its buffer and forward it later on. This gives the benefit of taking advantage of good channel conditions as the relay can only transmit when the channel conditions are good. The dissertation starts with conventional relaying and considers the problem of minimizing the total consumed power while maintaining system QoS. After upper bounding the system performance, more practical algorithms which require reduced feedback overhead are explored. Buffer-aided relaying is then considered and the joint user-and-hop scheduler is introduced which exploits multi-user diversity (MUD) and 5 multi-hop diversity (MHD) gains together in dual-hop broadcast channels. Next joint user-and-hop scheduling is extended to the shared relay channel where two source-destination pairs share a single relay. The benefits of buffer-aided relaying in the bidirectional relay channel utilizing network coding are then explored. Finally, a new transmission protocol
Khamfroush, Hana; Roetter, Daniel Enrique Lucani; Barros, João
We consider the problem of finding an optimal packet transmission policy that minimizes the total cost of transmitting M data packets from a source S to two receivers R1,R2 over half-duplex, erasure channels. The source can either broadcast random linear network coding (RLNC) packets to the recei......We consider the problem of finding an optimal packet transmission policy that minimizes the total cost of transmitting M data packets from a source S to two receivers R1,R2 over half-duplex, erasure channels. The source can either broadcast random linear network coding (RLNC) packets...... to the receivers or transmit using unicast sessions at each time slot. We assume that the receivers can share their knowledge with each other by sending RLNC packets using unicast transmissions. We model this problem by using a Markov Decision Process (MDP), where the actions include the source of and type...
ORGANIZATION NAME(S) AND ADDRESS(ES) American University in Dubai Sheikh Zaed Road, 5th Interchange Dubai 28282 United Arab Emirates 8...energy at all relays could provide further benefit. In this section, we first present a brief overview of approaches proposed in the literature for...Lifetime Constraints in WSN’s Various techniques proposed in the literature for conserving energy in ad hoc and sensor networks can be generally
Hardesty, Shermain D.
Few agricultural marketing cooperatives have nationally prominent brand names. Instead, they tend to concentrate in commodity-oriented markets, which can be attributed to the cooperative principlesÂ—user-benefit, user-financed and user-control. However, these structural disadvantages can be overcome. Due to the user-benefit principle, cooperatives often have seasonal product availability and/or limited product lines; they also suffer from the horizon problem, lacking the structure to provide ...
Full Text Available Content caching is a promising approach to enhancing bandwidth utilization and minimizing delivery delay for new-generation Internet applications. The design of content caching is based on the principles that popular contents are cached at appropriate network edges in order to reduce transmission delay and avoid backhaul bottleneck. In this paper, we propose a cooperative caching replacement and efficiency optimization scheme for IP-based wireless networks. Wireless edges are designed to establish a one-hop scope of caching information table for caching replacement in cases when there is not enough cache resource available within its own space. During the course, after receiving the caching request, every caching node should determine the weight of the required contents and provide a response according to the availability of its own caching space. Furthermore, to increase the caching efficiency from a practical perspective, we introduce the concept of quality of user experience (QoE and try to properly allocate the cache resource of the whole networks to better satisfy user demands. Different caching allocation strategies are devised to be adopted to enhance user QoE in various circumstances. Numerical results are further provided to justify the performance improvement of our proposal from various aspects.
Kosmides, Pavlos; Adamopoulou, Evgenia; Demestichas, Konstantinos; Theologou, Michael; Anagnostou, Miltiades; Rouskas, Angelos
The development of smart cities has been the epicentre of many researchers' efforts during the past decade. One of the key requirements for smart city networks is mobility and this is the reason stable, reliable and high-quality wireless communications are needed in order to connect people and devices. Most research efforts so far, have used different kinds of wireless and sensor networks, making interoperability rather difficult to accomplish in smart cities. One common solution proposed in the recent literature is the use of software defined networks (SDNs), in order to enhance interoperability among the various heterogeneous wireless networks. In addition, SDNs can take advantage of the data retrieved from available sensors and use them as part of the intelligent decision making process contacted during the resource allocation procedure. In this paper, we propose an architecture combining heterogeneous wireless networks with social networks using SDNs. Specifically, we exploit the information retrieved from location based social networks regarding users' locations and we attempt to predict areas that will be crowded by using specially-designed machine learning techniques. By recognizing possible crowded areas, we can provide mobile operators with recommendations about areas requiring datacell activation or deactivation.
Mozaffari, Mohammad; Saad, Walid; Bennis, Mehdi; Debbah, Merouane
In this paper, the effective use of multiple quadrotor drones as an aerial antenna array that provides wireless service to ground users is investigated. In particular, under the goal of minimizing the airborne service time needed for communicating with ground users, a novel framework for deploying and operating a drone-based antenna array system whose elements are single-antenna drones is proposed. In the considered model, the service time is minimized by jointly optimizing the wireless trans...
This thesis aims to investigate the incorporation of cooperative techniques in cognitive radio networks over Nakagami-m fading channels. These last years, spectrum sharing mechanisms has gained a lot of interest in the wireless communication domain. Using cooperation in a cognitive set up make the use of spectrum much more efficient. Moreover, it helps to extend the coverage area of the cognitive network and also to reduce the transmitting power and, thus, the generated interference. In this work, we consider two particular scenarios for cooperative cognitive radio systems. The first scenario consider multihop regenerative relaying in an underlay cognitive set up. The cooperation is performed in the secondary system, in the presence of multiple primary users. Both interference power and peak power constraints are taking into account. Closed-form expressions for the statistical characteristics and multiple end- to-end performance metrics are derived. Different scenarios are presented to illustrate the obtained results and Monte Carlo simulations confirm the accuracy of our analytical derivations. In the second part of this work, we consider an overlay cognitive network with the spectrally efficient two-phase two-way relaying protocol. Two relay selection techniques, optimizing both the primary and the secondary communication, are presented. The overall outage performance is investigated and an optimal power allocation scheme, that ameliorate the outage performance of the system, is proposed. Numerical simulations are presented to illustrate and compare the obtained results.
Full Text Available Management of wireless networks as well as wired networks by using software-defined networking (SDN has been highlighted continually. However, control features of a wireless network differ from those of a wired network in several aspects. In this study, we identify the various inefficient points when controlling and managing wireless networks by using SDN and propose SDN-based control architecture called Proxcon to resolve these problems. Proxcon introduces the concept of a proxy SDN controller (PSC for the wireless network control, and the PSC entrusted with the role of a main controller performs control operations and provides the latest network state for a network administrator. To address the control inefficiency, Proxcon supports offloaded SDN operations for controlling wireless networks by utilizing the PSC, such as local control by each PSC, hybrid control utilizing the PSC and the main controller, and locally cooperative control utilizing the PSCs. The proposed architecture and the newly supported control operations can enhance scalability and response time when the logically centralized control plane responds to the various wireless network events. Through actual experiments, we verified that the proposed architecture could address the various control issues such as scalability, response time, and control overhead.
Lee, Da-Sheng; Liu, Yu-Hong; Lin, Chii-Ruey
Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS) and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network. PMID:23443370
Full Text Available Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network.
Lee, Da-Sheng; Liu, Yu-Hong; Lin, Chii-Ruey
Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS) and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network.
Møller, Janus Heide; Sørensen, Jesper Hemming; Krigslund, Rasmus
Media content distribution constitutes a growing share of the services on the Internet. In recent years methods for cooperative media distribution has been a research area with high activity. Concurrently wireless internet connections have emerged. Wireless connection technologies, e.g. Wimax, have...
Chmiel, Alan; Humphreys, Brad
A compact, ambulatory biometric data acquisition system has been developed for space and commercial terrestrial use. BioWATCH (Bio medical Wireless and Ambulatory Telemetry for Crew Health) acquires signals from biomedical sensors using acquisition modules attached to a common data and power bus. Several slots allow the user to configure the unit by inserting sensor-specific modules. The data are then sent real-time from the unit over any commercially implemented wireless network including 802.11b/g, WCDMA, 3G. This system has a distributed computing hierarchy and has a common data controller on each sensor module. This allows for the modularity of the device along with the tailored ability to control the cards using a relatively small master processor. The distributed nature of this system affords the modularity, size, and power consumption that betters the current state of the art in medical ambulatory data acquisition. A new company was created to market this technology.
Joshi, Gyanendra Prasad; Nam, Seung Yeob; Kim, Sung Won
A cognitive radio wireless sensor network is one of the candidate areas where cognitive techniques can be used for opportunistic spectrum access. Research in this area is still in its infancy, but it is progressing rapidly. The aim of this study is to classify the existing literature of this fast emerging application area of cognitive radio wireless sensor networks, highlight the key research that has already been undertaken, and indicate open problems. This paper describes the advantages of cognitive radio wireless sensor networks, the difference between ad hoc cognitive radio networks, wireless sensor networks, and cognitive radio wireless sensor networks, potential application areas of cognitive radio wireless sensor networks, challenges and research trend in cognitive radio wireless sensor networks. The sensing schemes suited for cognitive radio wireless sensor networks scenarios are discussed with an emphasis on cooperation and spectrum access methods that ensure the availability of the required QoS. Finally, this paper lists several open research challenges aimed at drawing the attention of the readers toward the important issues that need to be addressed before the vision of completely autonomous cognitive radio wireless sensor networks can be realized.
Gyanendra Prasad Joshi
Full Text Available A cognitive radio wireless sensor network is one of the candidate areas where cognitive techniques can be used for opportunistic spectrum access. Research in this area is still in its infancy, but it is progressing rapidly. The aim of this study is to classify the existing literature of this fast emerging application area of cognitive radio wireless sensor networks, highlight the key research that has already been undertaken, and indicate open problems. This paper describes the advantages of cognitive radio wireless sensor networks, the difference between ad hoc cognitive radio networks, wireless sensor networks, and cognitive radio wireless sensor networks, potential application areas of cognitive radio wireless sensor networks, challenges and research trend in cognitive radio wireless sensor networks. The sensing schemes suited for cognitive radio wireless sensor networks scenarios are discussed with an emphasis on cooperation and spectrum access methods that ensure the availability of the required QoS. Finally, this paper lists several open research challenges aimed at drawing the attention of the readers toward the important issues that need to be addressed before the vision of completely autonomous cognitive radio wireless sensor networks can be realized.
Yulianto, Budi; Layona, Rita; Dewi, Lusiana Citra
Smartphone has become a daily necessity in supporting the mobility of users, including teachers and students. The need of users to make multi-presentation via a smartphone wirelessly does not fit with the cost and multiplatform support. This study aims to produce a solution by using Raspberry Pi as a wireless digital media player that will be…
National Aeronautics and Space Administration — Many wireless technologies are already available for sensor applications. It is inevitable that many non-interoperable wireless technologies between 400 MHz and 5.8...
Full Text Available Network administrators need to keep administrative user information for each network device, but network devices usually support only limited functions for user management. WLAN security is a modern problem that needs to be solved and it requires a lot of overhead especially when applied to corporate wireless networks. Administrators can set up a RADIUS server that uses an external database server to handle authentication, authorization, and accounting for network security issues.
Daniel P. Huebner; Sarah R. Hurteau
Inspection of cavity nests and nest boxes is often required during studies of cavity-nesting birds, and fiberscopes and pole-mounted video cameras are sometimes used for such inspection. However, the cost of these systems may be prohibitive for some potential users. We describe a user-built, wireless cavity viewer that can be used to access cavities as high as 15 m and...
Bødker, Susanne; Grønbæk, Kaj
This paper describes experiments with a design technique that we denote cooperative prototyping. The experiments consider design of a patient case record system for municipal dental clinics in which we used HyperCard, an off the shelf programming environment for the Macintosh. In the ecperiments we...... tried to achieve a fluent work-like evaluation of prototypes where users envisioned future work with a computer tool, at the same time as we made on-line modifications of prototypes in cooperation with the users when breakdown occur in their work-like evaluation. The experiments showed...... that it was possible to make a number of direct manipulation changes of prototypes in cooperation with the users, in interplay with their fluent work-like evaluation of these. However, breakdown occurred in the prototyping process when we reached the limits of the direct manipulation support for modification. From...
First page Back Continue Last page Overview Graphics. Wireless Communication Technologies. Since 1999, the wireless LAN has experienced a tremendous growth. Reasons: Adoption of industry standards. Interoperability testing. The progress of wireless equipments to higher data rates. Rapid decrease in product ...
Hernandez, Nestor; Heide, Janus; Roetter, Daniel Enrique Lucani
Cooperative techniques in wireless mobile networks typically leverage short-range communication technologies, e.g., WiFi, to allow data exchange between devices forming a mobile cloud. These mobile clouds have been considered as a key to reduce the cost of multicast services for the network...... operators as well as a means to deliver a better quality to the users. In fact, LTE-A includes Device-to-Device communication capabilities to enable such a direct communication between devices. The underlying assumption for attaining the throughput gains in mobile clouds is that the communication rate...... between devices is typically larger than the data rate from the base station to a receiver. However, while the data rates on cellular technologies have been steadily increasing, short-range communication speeds have remained largely unchanged calling into question these assumptions. This work’s goal...
A complete guide to the CCNA Wireless exam by leading networking authority Todd Lammle. The CCNA Wireless certification is the most respected entry-level certification in this rapidly growing field. Todd Lammle is the undisputed authority on networking, and this book focuses exclusively on the skills covered in this Cisco certification exam. The CCNA Wireless Study Guide joins the popular Sybex study guide family and helps network administrators advance their careers with a highly desirable certification.: The CCNA Wireless certification is the most respected entry-level wireless certification
Bhavana Butani; Piyush Kumar Shukla; Sanjay Silakari
Wireless sensor networks (WSNs) are novel large-scale wireless networks that consist of distributed, self organizing, low-power, low-cost, tiny sensor devices to cooperatively collect information through infrastructure less wireless networks. These networks are envisioned to play a crucial role in variety of applications like critical military surveillance applications, forest fire monitoring, commercial applications such as building security monitoring, traffic surveillance, habitat monitori...
Rosario G. Garroppo
Full Text Available In modern houses, the presence of sensors and actuators is increasing, while communication services and entertainment systems had long since settled into everyday life. The utilization of wireless communication technologies, such as ZigBee, Wi-Fi, and Bluetooth, is attractive because of their short installation times and low costs. The research is moving towards the integration of the various home appliances and devices into a single domotics system, able to exploit the cooperation among the diverse subsystems and offer the end-user a single multiservice platform. In this scenario, the paper presents the experimental evaluation of a domotics framework centered on a SIP-based home gateway (SHG. While SIP is used to build a common control plane, the SHG is in charge of translating the user commands from and to the specific domotics languages. The analysis has been devoted to assess both the performance of the SHG software framework and the negative effects produced by the simultaneous interference among the three widespread wireless technologies.
Azpilicueta, Leire; López-Iturri, Peio; Aguirre, Erik; Mateo, Ignacio; Astrain, José Javier; Villadangos, Jesús; Falcone, Francisco
The use of wireless networks has experienced exponential growth due to the improvements in terms of battery life and low consumption of the devices. However, it is compulsory to conduct previous radio propagation analysis when deploying a wireless sensor network. These studies are necessary to perform an estimation of the range coverage, in order to optimize the distance between devices in an actual network deployment. In this work, the radio channel characterization for ISM 2.4 GHz Wireless Sensor Networks (WSNs) in an inhomogeneous vegetation environment has been analyzed. This analysis allows designing environment monitoring tools based on ZigBee and WiFi where WSN and smartphones cooperate, providing rich and customized monitoring information to users in a friendly manner. The impact of topology as well as morphology of the environment is assessed by means of an in-house developed 3D Ray Launching code, to emulate the realistic operation in the framework of the scenario. Experimental results gathered from a measurement campaign conducted by deploying a ZigBee Wireless Sensor Network, are analyzed and compared with simulations in this paper. The scenario where this network is intended to operate is a combination of buildings and diverse vegetation species. To gain insight in the effects of radio propagation, a simplified vegetation model has been developed, considering the material parameters and simplified geometry embedded in the simulation scenario. An initial location-based application has been implemented in a real scenario, to test the functionality within a context aware scenario. The use of deterministic tools can aid to know the impact of the topological influence in the deployment of the optimal Wireless Sensor Network in terms of capacity, coverage and energy consumption, making the use of these systems attractive for multiple applications in inhomogeneous vegetation environments.
Full Text Available The use of wireless networks has experienced exponential growth due to the improvements in terms of battery life and low consumption of the devices. However, it is compulsory to conduct previous radio propagation analysis when deploying a wireless sensor network. These studies are necessary to perform an estimation of the range coverage, in order to optimize the distance between devices in an actual network deployment. In this work, the radio channel characterization for ISM 2.4 GHz Wireless Sensor Networks (WSNs in an inhomogeneous vegetation environment has been analyzed. This analysis allows designing environment monitoring tools based on ZigBee and WiFi where WSN and smartphones cooperate, providing rich and customized monitoring information to users in a friendly manner. The impact of topology as well as morphology of the environment is assessed by means of an in-house developed 3D Ray Launching code, to emulate the realistic operation in the framework of the scenario. Experimental results gathered from a measurement campaign conducted by deploying a ZigBee Wireless Sensor Network, are analyzed and compared with simulations in this paper. The scenario where this network is intended to operate is a combination of buildings and diverse vegetation species. To gain insight in the effects of radio propagation, a simplified vegetation model has been developed, considering the material parameters and simplified geometry embedded in the simulation scenario. An initial location-based application has been implemented in a real scenario, to test the functionality within a context aware scenario. The use of deterministic tools can aid to know the impact of the topological influence in the deployment of the optimal Wireless Sensor Network in terms of capacity, coverage and energy consumption, making the use of these systems attractive for multiple applications in inhomogeneous vegetation environments.
Brezillon, P.; Cases, E.; CEA Centre d'Etudes de la Vallee du Rhone, 30 - Marcoule
We are in the process of an intelligent cooperative system in a nuclear plant application. The system must cooperate with an operator who accomplishes a task of supervision of a real-world process. We point out in the paper that a cooperation between a cooperative system and an operator has two modes: a waking state and a participating state. During the waking state, the system observes the operator's behavior and the consequences on the process. During the participation state, the cooperative system builds jointly with the user a solution to the problem. In our approach, the cooperation depends on the system capabilities to explain, to incrementally acquire knowledge and to make explicit the context of the cooperation. We develop these ideas in the framework of the design of the cooperative system in the nuclear plant. (authors). 22 refs., 1 fig
Dean, Richard A.; Levesque, Allen H.
The rapid introduction of digital wireless networks is an important part of the emerging digital communications scene. The introduction of Digital Cellular, LEO and GEO Satellites, and Personal Communications Services poses both a challenge and an opportunity for the data user. On the one hand wireless access will introduce significant new portable data services such as personal notebooks, paging, E-mail, and fax that will put the information age in the user's pocket. On the other hand the challenge of creating a seamless and transparent environment for the user in multiple access environments and across multiple network connections is formidable. A summary of the issues associated with developing techniques and standards that can support transparent and seamless data services is presented. The introduction of data services into the radio world represents a unique mix of RF channel problems, data protocol issues, and network issues. These problems require that experts from each of these disciplines fuse the individual technologies to support these services.
In this chapter international cooperation of the Division for Radiation Safety, NPP Decommissioning and Radwaste Management of the VUJE, a. s. is presented. Very important is cooperation with the International Atomic Energy Agency. This cooperation has various forms - national and regional projects of technical cooperation, coordinated research activities, participation of our experts in preparation of the IAEA documentation etc.
Full Text Available If there’s one thing Canadians agree on, it’s that Canada’s wireless industry can and should be more competitive. The federal government is on side with the policy objective of having four carriers in every region and has responded with policies that provide commercial advantages to entrants. But, the rub is that there has not been a study that actually assesses the state of competition in wireless services in Canada, until now. Those in favour of policies that will promote and sustain entry point to Canada’s high average revenue per user and low wireless penetration rate (mobile connections per capita as evidence that there is insufficient competition. The difficulty is that the facts are not consistent with this simplistic analysis. Measurements of wireless penetration are skewed toward countries that maintain the Calling Party Pays Protocol and favour pay-as-you-go plans, both of which encourage inflated user counts. Canada’s participation per capita on monthly plans and minutes of voice per capita are not outliers. Moreover, in terms of smartphone adoption and smartphone data usage, Canada is a global leader, contributing to high average revenue per user. Consistent with being world leaders in the rollout of high speed wireless networks, Canada lead its peer group in capital expenditures per subscriber in 2012: the competition of importance to Canadians is not just over price, but also over the quality of wireless networks. In any event, none of the measures typically used in international comparisons are relevant to assessing the competitiveness of Canadian wireless services. The appropriate competitive analysis recognizes two relevant features of the technology of wireless services: (i high fixed and sunk capital costs; and (ii economies of scale and scope. The implications of these are that profitability requires mark ups over short run measures of cost — high gross margins — and that there will be a natural, upper limit on
Falch, Morten; Henten, Anders; Tadayoni, Reza
barriers of entry. In this paper three issues are discussed: 1) Developments in pricing schemes for Internet interconnection and Internet access with special focus on the role of wireless access. 2) Developments in supporting infrastructures with special focus on the increasing role of wireless......The Internet has undergone a growing diversification with regard to types of users, kinds of services and use of transmission technologies and infrastructures. Today, internet services are delivered by the use of many different wired and wireless communication technologies with different technical...... capabilities and limitations, and with different techno-economic characteristics. The question is whether these trends challenge the current mode of governance for the Internet. In the early days, the Internet was considered to be open, free, competitive, with a high level of entrepreneurialism, and with low...
Vesa A. Korhonen
Full Text Available We discuss how a short-range wireless communication service implemented for modern mobile communication devices can provide additional value for both the consumer and the service/product provider. When used as an information search tool, such systems allow services and products being promoted at the location they are available. For the customer, it may provide a “digitally augmented vision”, an enhanced view to the current environment. With data filtering and search rules, this may provide a self-manageable context, where the user's own personal environment and preferences to the features available in the current surroundings cooperate with a direct connection to the web-based social media. A preliminary design for such service is provided. The conclusion is that the method can generate additional revenue to the company and please the customers' buying process. In addition to the marketing, the principles described here are also applicable to other forms of human interaction.
Full Text Available Wireless-powered cellular networks (WPCNs are currently being investigated to exploit the reliability and improve battery lifetime of mobile users. This paper investigates the energy harvesting structure of the full-duplex relaying networks. By using the time switching based relaying (TSR protocol and Amplify-and-Forward (AF model in delay-limited transmission scheme, we propose the closed-form expression of the outage probability and then calculate the optimal throughput. An important result can be taken obviously that the time fraction in TSR, the position of relay, the noise as well as the energy conversation impacting on the outage probability as well as the optimal throughput. By Monte Carlo simulation, the numerical results indicate an effective relaying strategy in full-duplex cooperative systems. Finally, we provide fundamental design guidelines for selecting time fraction in TSR that satisfies the requirements of a practical relaying system.
Treglia, Joseph; Ramnarine-Rieks, Angela; McKnight, Lee
This paper describes the formation of the Wireless Grid Innovation Testbed (WGiT) coordinated by a virtual consortium involving academic and non-academic entities. Syracuse University and Virginia Tech are primary university partners with several other academic, government, and corporate partners. Objectives include: 1) coordinating knowledge sharing, 2) defining key parameters for wireless grids network applications, 3) dynamically connecting wired and wireless devices, content and users, 4) linking to VT-CORNET, Virginia Tech Cognitive Radio Network Testbed, 5) forming ad hoc networks or grids of mobile and fixed devices without a dedicated server, 6) deepening understanding of wireless grid application, device, network, user and market behavior through academic, trade and popular publications including online media, 7) identifying policy that may enable evaluated innovations to enter US and international markets and 8) implementation and evaluation of the international virtual collaborative process.
Elmabrok, Osama; Ghalaii, Masoud; Razavi, Mohsen
We examine the applicability of wireless indoor quantum key distribution (QKD) in hybrid quantum-classical networks. We propose practical configurations that would enable wireless access to such networks. The proposed setups would allow an indoor wireless user, equipped with a QKD-enabled mobile device, to communicate securely with a remote party on the other end of the access network. QKD signals, sent through wireless indoor channels, are combined with classical ones and sent over shared fiber links to the remote user. Dense wavelengthdivision multiplexing would enable the simultaneous transmission of quantum and classical signals over the same fiber. We consider the adverse effects of the background noise induced by Raman scattered light on the QKD receivers due to such an integration. In addition, we consider the loss and the background noise that arise from indoor environments. We consider a number of discrete and continuous-variable QKD protocols and study their performance in different scenarios.
Poor, H. Vincent; Schaefer, Rafael F.
Security is a very important issue in the design and use of wireless networks. Traditional methods of providing security in such networks are impractical for some emerging types of wireless networks due to the light computational abilities of some wireless devices [such as radio-frequency identification (RFID) tags, certain sensors, etc.] or to the very large scale or loose organizational structure of some networks. Physical layer security has the potential to address these concerns by taking...
This book is the second volume on Cooperative Robots and Sensor Networks. The primary objective of this book is to provide an up-to-date reference for cutting-edge studies and research trends related to mobile robots and wireless sensor networks, and in particular for the coupling between them. Indeed, mobile robots and wireless sensor networks have enabled great potentials and a large space for ubiquitous and pervasive applications. Robotics and wireless sensor networks have mostly been considered as separate research fields and little work has investigated the marriage between these two technologies. However, these two technologies share several features, enable common cyber-physical applications and provide complementary support to each other. The book consists of ten chapters, organized into four parts. The first part of the book presents three chapters related to localization of mobile robots using wireless sensor networks. Two chapters presented new solutions based Extended Kalman Filter and Particle Fi...
Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.; Stephano, Amanda (Indiana University); Tabriz, Parisa (University of Illinois at Urbana-Champaign); Pelon, Kristen (Cedarville University); McCoy, Damon (University of Colorado, Boulder); Lodato, Mark (Lafayette College); Hemingway, Franklin (University of New Mexico); Custer, Ryan P.; Averin, Dimitry (Polytechnic University); Franklin, Jason (Carnegie Mellon University); Kilman, Dominique Marie
Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide  and Motorola Canopy ). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance , and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more
Wireless networks are undergoing an unprecedented revolution in the last decade. With the explosion of delay-sensitive applications in the Internet (i.e., online gaming and VoIP), latency becomes a major issue for the development of wireless technology. Taking advantage of the significant decline in memory prices, industrialists equip the network devices with larger buffering capacities to improve the network throughput by limiting packets drops. Over-buffering results in increasing the time that packets spend in the queues and, thus, introducing more latency in networks. This phenomenon is known as “bufferbloat”. While throughput is the dominant performance metric, latency also has a huge impact on user experience not only for real-time applications but also for common applications like web browsing, which is sensitive to latencies in order of hundreds of milliseconds. Concerns have arisen about designing sophisticated queue management schemes to mitigate the effects of such phenomenon. My thesis research aims to solve bufferbloat problem in both traditional half-duplex and cutting-edge full-duplex wireless systems by reducing delay while maximizing wireless links utilization and fairness. Our work shed lights on buffer management algorithms behavior in wireless networks and their ability to reduce latency resulting from excessive queuing delays inside oversized static network buffers without a significant loss in other network metrics. First of all, we address the problem of buffer management in wireless full-duplex networks by using Wireless Queue Management (WQM), which is an active queue management technique for wireless networks. Our solution is based on Relay Full-Duplex MAC (RFD-MAC), an asynchronous media access control protocol designed for relay full-duplexing. Compared to the default case, our solution reduces the end-to-end delay by two orders of magnitude while achieving similar throughput in most of the cases. In the second part of this thesis
Ziaul Haq Abbas
Wireless Internet access is almost pervasive nowadays, and many types of wireless networks can be used to access the Internet. However, along with this growth, there is an even greater concern about the energy consumption and efficiency of mobile devices as well as of the supporting networks, triggering the appearance of the concept of green communication. While some efforts have been made towards this direction, challenges still exist and need to be tackled from diverse perspectives. Cellular networks, WLANs, and ad hoc networks in the form of wireless mesh networks are the most popular technologies for wireless Internet access. The availability of such a variety of access networks has also paved the way to explore synergistic approaches for Internet access, leading to the concept of hybrid networks and relay communications. In addition, many mobile devices are being equipped with multiple interfaces, enabling them to operate in hybrid networks. In contrast, the improvements in the battery technology itself have not matched the pace of the emerging mobile applications. The situation becomes more sophisticated when a mobile device functions also as a relay node to forward other station's data. In the literature, energy efficiency of mobile devices has been addressed from various perspectives such as protocol-level efforts, battery management efforts, etc. However, there is little work on energy efficiency in hybrid mobile and wireless networks and devices with heterogeneous connections. For example, when there are multiple networks available to a mobile device, how to achieve optimum long-term energy consumption of such a device is an open question. Furthermore, in today's cellular networks, micro-, pico-, and femto-cells are the most popular network topologies in order to support high data rate services and high user density. With the growth of such small-cell solutions, the energy consumption of these networks is also becoming an important concern for operators
Song, Ji-Won; Norman, Donald; Nam, Tek-Jin; Qin, Shengfeng
Users, especially the non-expert users, commonly experience problems when connecting multiple devices with interoperability. While studies on multiple device connections are mostly concentrated on spontaneous device association techniques with a focus on security aspects, the research on user interaction for device connection is still limited. More research into understanding people is needed for designers to devise usable techniques. This research applies the Research-through-Design method and studies the non-expert users' interactions in establishing wireless connections between devices. The "Learning from Examples" concept is adopted to develop a study focus line by learning from the expert users' interaction with devices. This focus line is then used for guiding researchers to explore the non-expert users' difficulties at each stage of the focus line. Finally, the Research-through-Design approach is used to understand the users' difficulties, gain insights to design problems and suggest usable solutions. When connecting a device, the user is required to manage not only the device's functionality but also the interaction between devices. Based on learning from failures, an important insight is found that the existing design approach to improve single-device interaction issues, such as improvements to graphical user interfaces or computer guidance, cannot help users to handle problems between multiple devices. This study finally proposes a desirable user-device interaction in which images of two devices function together with a system image to provide the user with feedback on the status of the connection, which allows them to infer any required actions.
Osunmuyiwa, Olufolabi; Ulusoy, Ali Hakan
Mobile health (m-health) is an extremely broad term that embraces mobile communication in the health sector and data packaging. The four broad categories of wireless networks are wireless personal area network, wireless metropolitan area network, wireless wide area network, and wireless local area network. Wireless local area network is the most notable of the wireless networking tools obtainable in the health sector. Transfer of delicate and critical information on radio frequencies should be secure, and the right to use must be meticulous. This article covers the business opportunities in m-health, threats faced by wireless networks in hospitals, and methods of mitigating these threats.
Federal Laboratory Consortium — The Wireless Emulation Laboratory (WEL) is a researchtest bed used to investigate fundamental issues in networkscience. It is a research infrastructure that emulates...
National Aeronautics and Space Administration — Wireless technologies are an increasingly attractive means for spatial data, input, manipulation, and distribution. Mobitrum is proposing an innovative Adaptive...
Full Text Available In this paper, the multi-hop wireless sensor network is created, which is realized by Micaz and Mib520 Board using TinyOS and Cygwin. The mote transmission mode is engaged and off-the-shelf protocols and algorithm, RSSI and PDR, are applied in this wireless network and the performance is improved. Several experiments are proposed to set standard RSSI threshold value to allow the user to send packet with efficient power level.
Arabshahi, Payman; Gray, Andrew; Okino, Clayton; Yan, Tsun-Yee
A scalable architecture for wireless digital data and voice communications via ad hoc networks has been proposed. Although the details of the architecture and of its implementation in hardware and software have yet to be developed, the broad outlines of the architecture are fairly clear: This architecture departs from current commercial wireless communication architectures, which are characterized by low effective bandwidth per user and are not well suited to low-cost, rapid scaling in large metropolitan areas. This architecture is inspired by a vision more akin to that of more than two dozen noncommercial community wireless networking organizations established by volunteers in North America and several European countries.
Benoît, Denis; Raulefs, Ronald; Fleury, Bernard Henri
In this paper we present the results of real-life localization experiments performed in an unprecedented cooperative and heterogeneous wireless context. These measurements are based on ZigBee and orthogonal frequency division multiplexing (OFDM) devices, respectively endowed with received signal...
Ploeg, J.; Semsar-Kazerooni, E.; Lijster, G.; Wouw, N. van de; Nijmeijer, H.
Cooperative adaptive cruise control (CACC) employs wireless intervehicle communication, in addition to onboard sensors, to obtain string-stable vehicle-following behavior at small intervehicle distances. As a consequence, however, CACC is vulnerable to communication impairments such as latency and
This brief investigates spectrum efficient and energy efficient strategies, known as cognitive radio networks (CRNs), to ensure secure cooperation between licensed and unlicensed users. The authors address issues of spectrum scarcity, spectrum sensing, transmission performance, trust-aware cooperation, and secure communications. Two security-aware cooperation based spectrum access schemes are presented. The first is a trust-aware cooperative framework for CRNs to improve the throughput or energy efficiency of licensed users and offer transmission opportunities to unlicensed users, taking into
Rhee, Man Young
The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr
PROF. OLIVER OSUAGWA
Dec 1, 2015 ... This work developed and simulated a mathematical model for a mobile wireless computational Grid architecture using networks of queuing ... (response time). Thus the problem is formulated as a non-cooperative game among .... evaluation are analytical modelling, simulation and measurement . In this ...
Marin Perianu, Mihai; Bosch, S.; Marin Perianu, Raluca; Scholten, Johan; Havinga, Paul J.M.
A coordinated team of mobile wireless sensor and actuator nodes can bring numerous benefits for various applications in the field of cooperative surveillance, mapping unknown areas, disaster management, automated highway and space exploration. This article explores the idea of mobile nodes using
In response to the call for increased mine safety and improved underground communications in the wake of recent mining fatalities, the Virginia Center for Coal and Energy Research at Virginia Tech is cooperating with the Virginia Department of Mines Minerals and Energy to offer a Symposium on the Capabilities and Availability of Wireless Communication and Tracking Systems for Underground Coal Mines.
This book details the use of the cooperative networks/relaying approach in new and emerging telecommunications technologies such as full-duplex radio, massive multiple-input multiple-output (MIMO), network coding and spatial modulation, and new application areas including visible light communications (VLC), wireless power transfer, and 5G.
Ploeg, J.; Semsar-Kazerooni, E.; Lijster, G.; Wouw, N. van de; Nijmeijer, H.
Cooperative Adaptive Cruise Control (CACC) employs wireless intervehicle communication, in addition to onboard sensors, to obtain string-stable vehicle-following behavior at small intervehicle distances. As a consequence, however, CACC is vulnerable to communication impairments such as packet loss,
Full Text Available , and will require unique energy efficient solutions. For instance, an MS may be battery-powered, and the relevant energy efficient solution would include switching-off the display and minimizing signalling overhead (e.g. sleep mode). Meanwhile energy efficient... solution for the BS may include the intelligent sleep mode policies when the number of users and the traffic load decreases . Due to the growing demand for advanced broadband wireless technologies and services, research in green radio solutions...
Campista , Miguel Elias Mitre
This text introduces the principles of routing protocols and metrics as they affect wireless networking environments, specifically in urban areas. Timely because of the recent rise in small city life, this topic includes the consideration of ad hoc, mesh, vehicular, sensor, and delay tolerant networks. These approaches are each unique, and author Miguel Mitre Campista provides a thorough, but accessible, explanation of their individual characteristics for engineers, computer scientists, IT professionals, and curious Internet users.
Bashar, Muhammad Shafi Al
In this dissertation, we present novel physical (PHY) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better…
H. Chen (Hong); L-F. Pau (Louis-François)
textabstractThis paper presents results on mass customization of wireless communications services and tariffs. It advocates for a user-centric view of wireless service configuration and pricing as opposed to present-day service catalog options. The focus is on design methodology and tools for such
Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep
Rohokale, Vandana M.
of the benefits of wireless sensor network scalability in terms of cooperative resource sharing wherein multiple diversity channels are created that results into the higher transmission rates, increased throughput and coverage range, improvement in reliability and end-to-end performance and much more. Cooperative...... wireless communication (CWC) greatly improves the cross layer optimizations. The cooperative wireless communication (CWC) concept is more applicable to wireless sensor networks and cognitive ad-hoc networks than that of cellular networks. In CWC, the active nodes may increase their effective QoS via...... in their encryption and decryption mechanisms. Due to their huge demand of memory and energy, these cryptographic algorithms can’t be employed to wireless sensor nodes. This research work proposes a novel secure lightweight protocol making use of cryptographic and Information Theoretic Security....
The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...
Hortos, William S.
The ecosystem is used as an evolutionary paradigm of natural laws for the distributed information retrieval via mobile agents to allow the computational load to be added to server nodes of wireless networks, while reducing the traffic on communication links. Based on the Food Web model, a set of computational rules of natural balance form the outer stage to control the evolution of mobile agents providing multimedia services with a wireless Internet protocol WIP. The evolutionary model shows how mobile agents should behave with the WIP, in particular, how mobile agents can cooperate, compete and learn from each other, based on an underlying competition for radio network resources to establish the wireless connections to support the quality of service QoS of user requests. Mobile agents are also allowed to clone themselves, propagate and communicate with other agents. A two-layer model is proposed for agent evolution: the outer layer is based on the law of natural balancing, the inner layer is based on a discrete version of a Kohonen self-organizing feature map SOFM to distribute network resources to meet QoS requirements. The former is embedded in the higher OSI layers of the WIP, while the latter is used in the resource management procedures of Layer 2 and 3 of the protocol. Algorithms for the distributed computation of mobile agent evolutionary behavior are developed by adding a learning state to the agent evolution state diagram. When an agent is in an indeterminate state, it can communicate to other agents. Computing models can be replicated from other agents. Then the agents transitions to the mutating state to wait for a new information-retrieval goal. When a wireless terminal or station lacks a network resource, an agent in the suspending state can change its policy to submit to the environment before it transitions to the searching state. The agents learn the facts of agent state information entered into an external database. In the cloning process, two
Wireless networks are very popular and have found wide spread usage amongst various segments, also in military environment. The deployment of wireless infrastructures allow to reduce the time it takes to install and dismantle communications networks. With wireless, users are more mobile and can easily get access to the network resources all the time. However, wireless technologies like WiFi or Bluetooth have security issues that hackers have extensively exploited over the years. In the paper several serious security flaws in wireless technologies are presented. Most of them enable to get access to the internal networks and easily carry out man-in-the-middle attacks. Very often, they are used to launch massive denial of service attacks that target the physical infrastructure as well as the RF spectrum. For instance, there are well known instances of Bluetooth connection spoofing in order to steal WiFi password stored in the mobile device. To raise the security awareness and protect wireless networks against an adversary attack, an analysis of attack methods and tools over time is presented in the article. The particular attention is paid to the severity, possible targets as well as the ability to persist in the context of protective measures. Results show that an adversary can take complete control of the victims' mobile device features if the users forget to use simple safety principles.
This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability
Today's wireless communications and networking practices are tightly coupled with economic considerations, to the extent that it is almost impossible to make a sound technology choice without understanding the corresponding economic implications. This book aims at providing a foundational introduction on how microeconomics, and pricing theory in particular, can help us to understand and build better wireless networks. The book can be used as lecture notes for a course in the field of network economics, or a reference book for wireless engineers and applied economists to understand how pricing
Wireless mesh networking is a new technology that has the potential to revolutionize how we access the Internet and communicate with co-workers and friends. Wireless Mesh Networks examines the concept and explores its advantages over existing technologies. This book explores existing and future applications, and examines how some of the networking protocols operate.The text offers a detailed analysis of the significant problems affecting wireless mesh networking, including network scale issues, security, and radio frequency interference, and suggests actual and potential solutions for each pro
Tiwari, Manish; Singh, Ghanshyam; Minzioni, Paolo
This book presents selected papers from 1st International Conference on Optical and Wireless Technologies, providing insights into the analytical, experimental, and developmental aspects of systems, techniques, and devices in these spheres. It explores the combined use of various optical and wireless technologies in next-generation networking applications, and discusses the latest developments in applications such as photonics, high-speed communication systems and networks, visible light communication, nanophotonics, and wireless and multiple-input-multiple-output (MIMO) systems. The book will serve as a valuable reference resource for academics and researchers across the globe.
Full Text Available The past decade has witnessed the emergence of Vehicular Ad-hoc Networks (VANET, specializing from the well-known Mobile Ad Hoc Networks (MANET to Vehicle-to-Vehicle (V2V and Vehicle-to-Infrastructure (V2I wireless communications. While the original motivation for Vehicular Networks was to promote traffic safety, recently it has become increasingly obvious that Vehicular Networks open new vistas for Internet access, providing weather or road condition, parking availability, distributed gaming, and advertisement. In previous papers [27,28], we introduced Cooperation as a Service (CaaS; a new service-oriented solution which enables improved and new services for the road users and an optimized use of the road network through vehicle's cooperation and vehicle-to-vehicle communications. The current paper is an extension of the first ones; it describes an improved version of CaaS and provides its full implementation details and simulation results. CaaS structures the network into clusters, and uses Content Based Routing (CBR for intra-cluster communications and DTN (Delay–and disruption-Tolerant Network routing for inter-cluster communications. To show the feasibility of our approach, we implemented and tested CaaS using Opnet modeler software package. Simulation results prove the correctness of our protocol and indicate that CaaS achieves higher performance as compared to an Epidemic approach.
Full Text Available Wireless communication is a trend nowadays for the industrial environment. A number of different technologies have emerged as solutions satisfying strict industrial requirements (e.g., WirelessHART, ISA100.11a, WIA-PA. As the industrial environment presents a vast range of applications, adopting an adequate solution for each case is vital to obtain good performance of the system. In this context, the routing and scheduling schemes associated with these technologies have a direct impact on important features, like latency and energy consumption. This situation has led to the development of a vast number of routing and scheduling schemes. In the present paper, we focus on the WirelessHART technology, emphasizing its most important routing and scheduling aspects in order to guide both end users and the developers of new algorithms. Furthermore, we provide a detailed literature review of the newest routing and scheduling techniques forWirelessHART, discussing each of their features. These routing algorithms have been evaluated in terms of their objectives, metrics, the usage of theWirelessHART structures and validation method. In addition, the scheduling algorithms were also evaluated by metrics, validation, objectives and, in addition, by multiple superframe support, as well as by the redundancy method used. Moreover, this paper briefly presents some insights into the main WirelessHART simulation modules available, in order to provide viable test platforms for the routing and scheduling algorithms. Finally, some open issues in WirelessHART routing and scheduling algorithms are discussed.
Hernandez, Inmaculada; Plancke, Patrick
The purpose of this workshop was to bring together representatives of European space agencies, aerospace industry, wireless technology industry, academia, research institutions, and end-users to do the following: (1...
An efficient scheduling request algorithm for opportunistic wireless access based on user grouping is proposed in this paper. Similar to the well-known opportunistic splitting algorithm, the proposed algorithm initially adjusts (or lowers) the threshold during a guard period if no user sends a scheduling request. However, if multiple users make requests simultaneously and therefore a collision occurs, the proposed algorithm no longer updates the threshold but narrows down the user search space by splitting the users into multiple groups iteratively, whereas the opportunistic splitting algorithm keeps adjusting the threshold until a single user is found. Since the threshold is only updated when no user sends a request, it is shown that the proposed algorithm significantly alleviates the burden of the signaling for the threshold distribution to the users by the scheduler. More importantly, the proposed algorithm requires a less number of mini-slots to make a user selection given a certain scheduling outage probability. © 2011 IEEE.
Hsu Myat Thwe
Full Text Available Abstract Nowadays remote patient health monitoring using wireless technology plays very vigorous role in a society. Wireless technology helps monitoring of physiological parameters like body temperature heart rate respiration blood pressure and ECG. The main aim of this paper is to propose a wireless sensor network system in which both heart rate and body temperature ofmultiplepatients can monitor on PC at the same time via RF network. The proposed prototype system includes two sensor nodes and receiver node base station. The sensor nodes are able to transmit data to receiver using wireless nRF transceiver module.The nRF transceiver module is used to transfer the data from microcontroller to PC and a graphical user interface GUI is developed to display the measured data and save to database. This system can provide very cheaper easier and quick respondent history of patient.
N. G. Tarhuni
Full Text Available Control of transmitted power is crucial for the successful operation of multi-user wireless channels communications. There are practical situations in which the transmitted power cannot be adjusted by feedback information; hence, only forward transmit power allocation can be applied, especially in situations where a feedback channel is not available in a wireless network or when wireless nodes are only transmit types. Conventionally, transmitted power can be fixed. Higher gain may be observed if the sensors’ transmitted power is randomized. In this work, random power allocation for a Nakagami-m distributed wireless channel model was investigated, and a number of random distributions were evaluated theoretically and tested by simulations. The outage probability was evaluated theoretically and validated by Monte Carlo simulations.
Iddan, Gavriel; Meron, Gavriel; Glukhovsky, Arkady; Swain, Paul
We have developed a new type of endoscopy, which for the first time allows painless endoscopic imaging of the whole of the small bowel. This procedure involves a wireless capsule endoscope and we describe here its successful testing in humans.
Ismail, Muhammad; Nee, Hans-Peter; Qaraqe, Khalid A; Serpedin, Erchin
This book focuses on the emerging research topic "green (energy efficient) wireless networks" which has drawn huge attention recently from both academia and industry. This topic is highly motivated due to important environmental, financial, and quality-of-experience (QoE) considerations. Specifically, the high energy consumption of the wireless networks manifests in approximately 2% of all CO2 emissions worldwide. This book presents the authors’ visions and solutions for deployment of energy efficient (green) heterogeneous wireless communication networks. The book consists of three major parts. The first part provides an introduction to the "green networks" concept, the second part targets the green multi-homing resource allocation problem, and the third chapter presents a novel deployment of device-to-device (D2D) communications and its successful integration in Heterogeneous Networks (HetNets). The book is novel in that it specifically targets green networking in a heterogeneous wireless medium, which re...
Younsung Choi; Youngsook Lee; Dongho Won
Wireless sensor networks are used to monitor physical or environmental conditions. However, authenticating a user or sensor in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication networks, resource limitation, and unattended operation. As a result, various authentication schemes have been proposed to provide secure and efficient communication. He et al. suggested a robust biometrics-based user authent...
""Informative...recommended""--Choice; ""interesting...a good read...well worth reading""--Contact Magazine. This history first looks at Marconi's wireless communications system and then explores its many applications, including marine radio, cellular telephones, police and military uses, television and radar. Radio collecting is also discussed, and brief biographies are provided for the major figures in the development and use of the wireless.
In this thesis we deal with security, penetration testing and different types of attacks on wireless networks. We theoretically familiarize with the field of wireless networks, security mechanisms and the most used security standards. Then we systematically overview the field of penetration testing. We divide the penetration testing on types and different methodologies. We explain the tasks of the provider and the subscriber in penetration testing. Description of the process of conducting the...
if concurrent engineering is to succeed. On the basis of ethnographic studies of cooperative design, the paper attempts to characterize cooperative work in the domain of design and to outline a set of crucial research problems to be addressed if CSCW is to help engineers and de-signers meet the challenges...
Full Text Available The wireless LAN standard, also known as WiFi, has begun to use commercial purposes. This paper describes access network architecture of wireless LAN for large scale deployment to provide public service. A metro Ethernet and digital subscriber line access network can be used for wireless LAN with access point. In this network architecture, access point plays interface between wireless node and network infrastructure. It is important to maintain access point without any failure and problems to public users. This paper proposes definition of rogue access point and classifies based on functional problem to access the Internet. After that, rogue access point detection scheme is described based on classification over the wireless LAN. The rogue access point detector can greatly improve the network availability to network service provider of wireless LAN.
Full Text Available The aim of this work is to develop a wireless local area network (LAN between different types of users (Radiation Oncologists, Radiological Physicists, Radiation Technologists, etc for efficient patient data management and to made easy the availability of information (chair side to improve the quality of patient care in Radiation Oncology department. We have used mobile workstations (Laptops and stationary workstations, all equipped with wireless-fidelity (Wi-Fi access. Wireless standard 802.11g (as recommended by Institute of Electrical and Electronic Engineers (IEEE, Piscataway, NJ has been used. The wireless networking was configured with the Service Set Identifier (SSID, Media Access Control (MAC address filtering, and Wired Equivalent Privacy (WEP network securities. We are successfully using this wireless network in sharing the indigenously developed patient information management software. The proper selection of the hardware and the software combined with a secure wireless LAN setup will lead to a more efficient and productive radiation oncology department.
Chen, Cailian; Guan, Xinping
This SpringerBrief evaluates the cooperative effort of sensor nodes to accomplish high-level tasks with sensing, data processing and communication. The metrics of network-wide convergence, unbiasedness, consistency and optimality are discussed through network topology, distributed estimation algorithms and consensus strategy. Systematic analysis reveals that proper deployment of sensor nodes and a small number of low-cost relays (without sensing function) can speed up the information fusion and thus improve the estimation capability of wireless sensor networks (WSNs). This brief also investiga
Mahmoud, Mohamed M E A
This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally. Also included is a new, efficient cooperation incentive scheme to stimulate the selfish nodes to relay information packets and enforce fairness. Many examples are provided, along with predictions for future directions of the field. Security
Drew, Wilfred, Jr.
Discusses the use of wireless technology in academic libraries. Topics include wireless networks; standards (IEEE 802.11); wired versus wireless; why libraries implement wireless technology; wireless local area networks (WLANs); WLAN security; examples of wireless use at Indiana State University and Morrisville College (New York); and useful…
Beuscart, R. J.; Molenda, S.; Souf, N.; Foucher, C.; Beuscart-Zephir, M. C.
Groupware and new Information Technologies have now made it possible for people in different places to work together in synchronous cooperation. Very often, designers of this new type of software are not provided with a model of the common workspace, which is prejudicial to software development and its acceptance by potential users. The authors take the example of a task of medical co-diagnosis, using a multi-media communication workstation. Synchronous cooperative work is made possible by us...
Full Text Available With the appearance of wireless data networks with variable coverage, band width and handoff strategies, in addition to the growing need of mobile nodes to freely roam among these networks, the support of an interoperable handoff strategy for hybrid wireless data networks is a requirement that needs to be addressed. The current trend in wireless data networks is to offer multimedia access to mobile users by employing the wireless local area network (WLAN standard IEEE802.11 while the user is located indoors; on the other hand, 3rd generation wireless networks (WAN are being deployed to provide coverage while the user is located outdoors. As a result, the mobile node will require a handoff mechanism to allow the user to roam between WLAN and WAN environments; up to this date several strategies have been proposed (Sattari et al., 2004 and HyoJin, 2007 in the literature, however, none of these have been standardized to date. To support this interoperability, the mobile node must be equipped with configurable wireless inetrfaces to support the handoff between the WLAN and the WAN networks. In this work a new algorithm is proposed to allow a mobile node to roam between a wireless local area network (IEEE802.11 and a WAN base station (UMTS, while employing IP mobility support. The algorithm is implemented in simulation, using the Network Simulator 2.
Chatzinotas, Symeon; De Gaudenzi, Riccardo
Cooperative and Cognitive Satellite Systems provides a solid overview of the current research in the field of cooperative and cognitive satellite systems, helping users understand how to incorporate state-of-the-art communication techniques in innovative satellite network architectures to enable the next generation of satellite systems. The book is edited and written by top researchers and practitioners in the field, providing a comprehensive explanation of current research that allows users to discover future technologies and their applications, integrate satellite and terrestrial systems
Heide, Janus; Pedersen, Morten Videbæk; Fitzek, Frank
In this work we consider the interconnection of islands formed by neighbouring devices in a highly dynamic topology. To allow for high mobility we take oﬀset in a purely wireless infrastructure where all devices incorporate a global and a local wireless communication interface. We consider...... cooperation as a means to improve the utilization of these interfaces. Furthermore we reﬂect on the use of network coding as a technique for decreasing the complexity of cooperative strategies and presents obstacles that must be addressed before network coding can be deployed....
Christensen, Lars P.B.
by allowing an increased reuse of network resources. To achieve this goal, one must first understand the nature of the problem and an introduction is therefore provided. In addition, the concept of graph-based models and approximations for wireless communications is introduced along with various Belief......This thesis is concerned with signal processing for improving the performance of wireless communication receivers for well-established cellular networks such as the GSM/EDGE and WCDMA/HSPA systems. The goal of doing so, is to improve the end-user experience and/or provide a higher system capacity...... Propagation (BP) methods for detecting the transmitted information, including the Turbo principle. Having established a framework for the research, various approximate detection schemes are discussed. First, the general form of linear detection is presented and it is argued that this may be preferable...
Oksa, P.; Soini, M.; Sydaenheimo, L.; Kivikoski, M. [Rauma Research Unit, Electronics Institute, Tampere University of Technology, Kalliokatu 2, 26100 Rauma (Finland)
The focus of this paper is on building control and monitoring systems. Traditionally these systems are based on wires and cables. A wireless approach can bring benefits to system flexibility, installation (new sites and buildings under retrofit), and financial issues. This paper presents an application-specific wireless Kilavi platform developed for building control purposes. Kilavi provides the means for open standard manufacturer-independent communication between different sensors and actuators. Heating, ventilation, air-conditioning, lighting, temperature and humidity measurement, and access control appliances can interact with each other with defined Kilavi messages and functions. Linking up these appliances into a single all-inclusive building control system offers a dexterous interface for the user to control building conditions and the interesting possibility of developing novel and varied building control applications to improve energy efficiency, security and living conditions. (author)
In that time, a project to bring the Information Age to villagers in southern India has won awards and given 50 000 "information shop" users in a dozen communities high-speed wireless telephone and Internet access. It has also helped improve more traditional Indian communication methods, such as community newspapers ...
smith 2005), which will be entirely based on CDMA technology, and will carry multimedia traffic (i.e. store and forward data, packetised telephony, interactive video, and streaming video). Cellular networks were developed with the primary objective of providing wireless access for mobile users. With the growth of the Internet ...
Li, Benjamin; Xu, Deyin
As advertisements are time and location sensitive, a challenge for wireless marketing is to have advertisements delivered when and where they are most convenient. In this paper we introduce a two-stage auction model for location-based wireless targeted advertising. This system extends the notion of location-based service by using location information to target advertising, and does so specifically by enabling advertisers to specify their preferences and bid for advertisement delivery, where those preferences are then used in a subsequent automated auction of actual deliveries to wireless data users. The automated auction in the second stage is especially effective because it can use information about the individual user profile data, including customer relationship management system contents as well as location from the wireless system's location management service, including potentially location history such as current trajectory from recent history and longer-term historical trip records for that user. Through two-stage auction, real-time bidding by advertisers and matching ads contents to mobile users help advertising information reach maximal value.
Dejan Milan Tepšić
networking it has never been easier to penetrate the network. One of the biggest problems of today's wireless networks is the lack of effective systems for intrusion detection. Forgetting to cover gaps in wireless network security may result in intrusion into the network by an attacker. Security in IEEE 802.11 wireless networks Although the IEEE 802.11 protocol defines security standards, wireless networks are one of the weakest links in the chain of computer networks. The basic security requirements of each computer network are reliable user authentication, privacy protection and user authentication. Security attacks on IEEE 802.11 wireless networks Non-technical attacks include a variety of human weaknesses, such as lack of conscience, negligence or over-confidence towards the strangers. Network attacks include a number of techniques that enable attackers to penetrate into the wireless network, or at least to disable it. Apart from the security problems with the IEEE 802.11 protocol, there are vulnerabilities in operating systems and applications on wireless clients. The methodology of attack Before testing wireless network security vulnerabilities, it is important to define a formal testing methodology. The first step before the actual attack is footprinting. The second step is the creation of a network map that shows how the wireless system looks. For this purpose, hackers are using specific tools, such as Network Stumbler, Nmap and Fping. When basic information about the wireless network is gathered, more information can be found out through the process of system scanning (enumeration. Attacks on IEEE 802.11 wireless networks Social engineering is a technique by which attackers exploit the natural trust of most people. Radio waves do not respect defined boundaries. If radio waves are broadcasted outside of the boundaries of the defined area, then it is necessary to reduce signal strength on wireless access points. In that way, radio waves travel over shorter distances
Nasri, M.; Helali, A.; Sghaier, H.; Maaref, H.
The emerging technology during the last years allowed the development of new sensors equipped with wireless communication which can be organized into a cooperative autonomous network. Some application areas for wireless sensor networks (WSNs) are home automations, health care services, military domain, and environment monitoring. The required constraints are limited capacity of processing, limited storage capability, and especially these nodes are limited in energy. In addition, such networks are tiny battery powered which their lifetime is very limited. During image processing and transmission to the destination, the lifetime of sensor network is decreased quickly due to battery and processing power constraints. Therefore, digital image transmissions are a significant challenge for image sensor based Wireless Sensor Networks (WSNs). Based on a wavelet image compression, we propose a novel, robust and energy-efficient scheme, called Priority Image Transmission (PIT) in WSN by providing various priority levels during image transmissions. Different priorities in the compressed image are considered. The information for the significant wavelet coeffcients are transmitted with higher quality assurance, whereas relatively less important coefficients are transmitted with lower overhead. Simulation results show that the proposed scheme prolongs the system lifetime and achieves higher energy efficiency in WSN with an acceptable compromise on the image quality.
JOSHUA L.Y. CHIENG
Full Text Available The growing demand of bandwidth in this modern internet age has been testing the existing telecommunication infrastructures around the world. With broadband speeds moving towards the region of Gbps and Tbps, many researches have begun on the development of using optical wireless technology as feasible and future methods to the current wireless technology. Unlike the existing radio frequency wireless applications, optical wireless uses electromagnetic spectrums that are unlicensed and free. With that, this project aim to understand and gain better understanding of optical wireless communication system by building an experimental and simulated model. The quality of service and system performance will be investigated and reviewed. This project employs laser diode as the propagation medium and successfully transferred audio signals as far as 15 meters. On its quality of service, results of the project model reveal that the bit error rate increases, signal-to-noise ratio and quality factor decreases as the link distance between the transmitter and receiver increases. OptiSystem was used to build the simulated model and MATLAB was used to assist signal-to-noise ratio calculations. By comparing the simulated and experimental receiver’s power output, the experimental model’s efficiency is at 66.3%. Other than the system’s performance, challenges and factors affecting the system have been investigated and discussed. Such challenges include beam divergence, misalignment and particle absorption.
Retscher, Guenther; Obex, Franz
Location-based Services (LBS) influence nowadays every individual's life due to the emerging market penetration of smartphones and other mobile devices. For smartphone Apps localization technologies are developed ranging from GNSS beyond to other alternative ubiquitous positioning methods as well as the use of the in-built inertial sensors, such as accelerometers, gyroscopes, magnetometer, barometer, etc. Moreover, signals-of-opportunity which are not intended for positioning at the first sight but are receivable in many environments such as in buildings and public spaces are more and more utilized for positioning and navigation. The use of Wi-Fi (Wireless Fidelity) is a typical example. These technologies, however, have become very powerful tools as the enable to track an individual or even a group of users. Most technical researchers imply that it is mainly about further enhancing technologies and algorithms including the development of new advanced Apps to improve personal navigation and to deliver location oriented information just in time to a single LBS user or group of users. The authors claim that there is a need that ethical and political issues have to be addressed within our research community from the very beginning. Although there is a lot of research going on in developing algorithms to keep ones data and LBS search request in private, researchers can no longer keep their credibility without cooperating with ethical experts or an ethical committee. In a study called InKoPoMoVer (Cooperative Positioning for Real-time User Assistance and Guidance at Multi-modal Public Transit Junctions) a cooperation with social scientists was initiated for the first time at the Vienna University of Technology, Austria, in this context. The major aims of this study in relation to ethical questions are addressed in this paper.
ABSTRACT. Wireless networking is currently being deployed for various applications. However, the application of wireless networking in healthcare remains a challenge mainly because of security and reliability concerns. This paper presents experimental results of performance analysis of a wireless network for healthcare ...
Gu, Tao; Wang, Liang; Chen, Hanhua
activity classes of data—for building activity models and design a scalable, noise-resistant, Emerging Pattern based Multi-user Activity Recognizer (epMAR) to recognize both single- and multi-user activities. We develop a multi-modal, wireless body sensor network for collecting real-world traces in a smart......The advances of wireless networking and sensor technology open up an interesting opportunity to infer human activities in a smart home environment. Existing work in this paradigm focuses mainly on recognizing activities of a single user. In this work, we address the fundamental problem...... of recognizing activities of multiple users using a wireless body sensor network, and propose a scalable pattern mining approach to recognize both single- and multi-user activities in a unified framework. We exploit Emerging Pattern—a discriminative knowledge pattern which describes significant changes among...
Recent years have been marked by an enormous growth of wireless communication networks and an extensive use of wireless applications. In return, this phenomenal expansion induced more concerns about the privacy and the security of the users. Physical layer security is one of the most promising solutions that were proposed to enhance the security of next generation wireless systems. The fundamental idea behind this technique is to exploit the randomness and the fluctuations of the wireless channel to achieve security without conditional assumptions on the computational capabilities of the eavesdropper. In fact, while these elements have traditionally been associated with signal deterioration, physical layer security uses them to ensure the confidentiality of the users. Nevertheless, these technical virtues rely heavily on perhaps idealistic channel state information assumptions. In that regard, the aim of this thesis is to look at the physical layer security paradigm from the channel uncertainty perspective. In particular, we discuss the ergodic secrecy capacity of different wiretap channels when the transmitter is hampered by the imperfect knowledge of the channel state information (CSI). We consider two prevalent causes of uncertainty for the CSI at transmitter (CSIT); either an error of estimation occurs at the transmitter and he can only base his coding and the transmission strategies on a noisy version of the CSI, or the CSI feedback link has a limited capacity and the legitimate receivers can only inform the transmitter about the quantized CSI. We investigate both the single-user multiple-input multiple-output (MIMO) wiretap channel and the multi-user broadcast wiretap channel. In the latter scenario, we distinguish between two situations: multiple messages transmission and common message transmission. We also discuss the broadcast channel with confidential messages (BCCM) where the transmitter has one common message to be transmitted to two users and one
Pervasive Mobile and Ambient Wireless Communications reports the findings of COST 2100, a project of the European intergovernmental COST framework addressing various topics currently emerging in mobile and wireless communications. Drawing on experience developed in this and earlier COST projects, the text represents the final outcome of collaborative work involving more than 500 researchers in 140 institutions and 30 countries (including outside Europe). The book’s subject matter includes: • transmission techniques; • signal processing; • radio channel modelling and measurement; • radio network issues; and • recent paradigms including ultra-wideband, cooperative, vehicle-to-vehicle and body communications. The research reported comes from a variety of backgrounds: academic, equipment-manufacturing and operational. The information contained in this book will bring the study reported to a wider audience from all those spheres of work. Pervasive Mobile and Ambient Wireless Communications will be of i...
Full Text Available In this paper, we introduce a cooperative medium access control (MAC protocol, named cooperative energy harvesting (CEH-MAC, that adapts its operation to the energy harvesting (EH conditions in wireless body area networks (WBANs. In particular, the proposed protocol exploits the EH information in order to set an idle time that allows the relay nodes to charge their batteries and complete the cooperation phase successfully. Extensive simulations have shown that CEH-MAC significantly improves the network performance in terms of throughput, delay and energy efficiency compared to the cooperative operation of the baseline IEEE 802.15.6 standard.
Full Text Available Indoor air quality monitoring system consists of wireless sensor device, nRF24L01 wireless transceiver modules, C8051MCU, STM32103 remote monitoring platform, alarm device and data server. Distributed in the interior space of wireless sensors measure parameters of the local air quality, wireless transceiver module of the MCU to transmit data to the remote monitoring platform for analysis which displayed and stored field environment data or charts. The data collecting from wireless sensors to be send by wireless Access Point to the remote data server based on B/S architecture, intelligent terminals such as mobile phone, laptop, tablet PC on the Internet monitor indoor air quality in real-time. When site environment air quality index data exceeds the threshold in the monitoring device, the remote monitoring platform sends out the alarm SMS signal to inform user by GSM module. Indoor air quality monitoring system uses modular design method, has the portability and scalability has the low manufacture cost, real-time monitoring data and man-machine interaction.
Sage, Cindy; Hardell, Lennart
Wireless-enabled headsets that connect to the internet can provide remote transcribing of patient examination notes. Audio and video can be captured and transmitted by wireless signals sent from the computer screen in the frame of the glasses. But using wireless glass-type devices can expose the user to a specific absorption rates (SAR) of 1.11-1.46 W/kg of radiofrequency radiation. That RF intensity is as high as or higher than RF emissions of some cell phones. Prolonged use of cell phones used ipsilaterally at the head has been associated with statistically significant increased risk of glioma and acoustic neuroma. Using wireless glasses for extended periods to teach, to perform surgery, or conduct patient exams will expose the medical professional to similar RF exposures which may impair brain performance, cognition and judgment, concentration and attention and increase the risk for brain tumors. The quality of medical care may be compromised by extended use of wireless-embedded devices in health care settings. Both medical professionals and their patients should know the risks of such devices and have a choice about allowing their use during patient exams. Transmission of sensitive patient data over wireless networks may increase the risk of hacking and security breaches leading to losses of private patient medical and financial data that are strictly protected under HIPPA health information privacy laws.
Full Text Available Transmit power optimisation in wireless networks based on beamforming have emerged as a promising technique to enhance the spectrum efficiency of present and future wireless communication systems. The aim of this study is to minimise the access point power consumption in cellular networks while maintaining a targeted quality of service (QoS for the mobile terminals. In this study, the targeted quality of service is delivered to a mobile station by providing a desired level of Signal to Interference and Noise Ratio (SINR. Base-stations are coordinated across multiple cells in a multi-antenna beamforming system. This study focuses on a multi-cell multi-antenna downlink scenario where each mobile user is equipped with a single antenna, but where multiple mobile users may be active simultaneously in each cell and are separated via spatial multiplexing using beamforming. The design criteria is to minimize the total weighted transmitted power across the base-stations subject to SINR constraints at the mobile users. The main contribution of this study is to define an iterative algorithm that is capable of finding the joint optimal beamformers for all basestations, based on a correlation-based channel model, the full-correlation model. Among all correlated channel models, the correlated channel model used in this study is the most accurate, giving the best performance in terms of power consumption. The environment here in this study is chosen to be Non-Light of- Sight (NLOS condition, where a signal from a wireless transmitter passes several obstructions before arriving at a wireless receiver. Moreover there are many scatterers local to the mobile, and multiple reflections can occur among them before energy arrives at the mobile. The proposed algorithm is based on uplink-downlink duality using the Lagrangian duality theory. Time-Division Duplex (TDD is chosen as the platform for this study since it has been adopted to the latest technologies in Fourth
Nirmalathas, A.; Bakaul, M.; Lim, C.; Novak, D.; Waterhouse, R.
Broadband wireless networks based on a number of new frequency windows at higher microwave and millimeter-wave frequencies have been actively pursued to provide ultra-high bandwidth services over a wireless networks. These networks will have a large number of antenna base-stations with high throughput. Significant reductions in antenna base-station complexity can be achieved if most of the signal routing and switching functions centralized at a central office in the network. In such a network, fiber feed networks can be effectively deployed to provide high bandwidth interconnections between multiple antenna base-stations and the central office. With wavelength division multiplexing, efficient optical fiber feed network architectures could be realised to provide interconnection to a large number of antenna base-stations. In this paper, we present an over view of our recent research into system technologies for fiber wireless networks.
Poor, H. Vincent; Schaefer, Rafael F.
Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.
Hwu, Shian U.
This presentation briefly discusses a research effort on Terabit Wireless communication systems for possible space applications. Recently, terahertz (THz) technology (300-3000 GHz frequency) has attracted a great deal of interest from academia and industry. This is due to a number of interesting features of THz waves, including the nearly unlimited bandwidths available, and the non-ionizing radiation nature which does not damage human tissues and DNA with minimum health threat. Also, as millimeter-wave communication systems mature, the focus of research is, naturally, moving to the THz range. Many scientists regard THz as the last great frontier of the electromagnetic spectrum, but finding new applications outside the traditional niches of radio astronomy, Earth and planetary remote sensing, and molecular spectroscopy particularly in biomedical imaging and wireless communications has been relatively slow. Radiologists find this area of study so attractive because t-rays are non-ionizing, which suggests no harm is done to tissue or DNA. They also offer the possibility of performing spectroscopic measurements over a very wide frequency range, and can even capture signatures from liquids and solids. According to Shannon theory, the broad bandwidth of the THz frequency bands can be used for terabit-per-second (Tb/s) wireless communication systems. This enables several new applications, such as cell phones with 360 degrees autostereoscopic displays, optic-fiber replacement, and wireless Tb/s file transferring. Although THz technology could satisfy the demand for an extremely high data rate, a number of technical challenges need to be overcome before its development. This presentation provides an overview the state-of-the- art in THz wireless communication and the technical challenges for an emerging application in Terabit wireless systems. The main issue for THz wave propagation is the high atmospheric attenuation, which is dominated by water vapor absorption in the THz
Wireless networking is not new to contemporary dental offices around the country. Wireless routers and network cards have made access to patient records within the office handy and, thereby, saving valuable chair side time and increasing productivity. As is the case with any rapidly developing technology, wireless technology also changes with the same rate. Unless, the users of the wireless networking understand the implications of these changes and keep themselves updated periodically, the office network will become obsolete very quickly. This update of the emerging security protocols and pertaining to ratified wireless 802.11 standards will be timely for the contemporary dentist whose office is wirelessly networked. This article brings the practicing dentist up-to-date on the newer versions and standards in wireless networking that are changing at a fast pace. The introduction of newer 802.11 standards like super G, Super AG, Multiple Input Multiple Output (MIMO), and pre-n are changing the pace of adaptation of this technology. Like any other rapidly transforming technology, information pertaining to wireless networking should be a priority for the contemporary dentist, an eventual end-user in order to be a well-informed and techno-savvy consumer.
Wireless optical communication refers to communication based on the unguided propagation of optical waves. The past 30 years have seen significant improvements in this technique - a wireless communication solution for the current millennium - that offers an alternative to radio systems; a technique that could gain attractiveness due to recent concerns regarding the potential effects of radiofrequency waves on human health.The aim of this book is to look at the free space optics that are already used for the exchange of current information; its many benefits, such as incorporating chan
Terré, Michel; Vivier, Emmanuelle
Wireless telecommunication systems generate a huge amount of interest. In the last two decades, these systems have experienced at least three major technological leaps, and it has become impossible to imagine how society was organized without them. In this book, we propose a macroscopic approach on wireless systems, and aim at answering key questions about power, data rates, multiple access, cellular engineering and access networks architectures.We present a series of solved problems, whose objective is to establish the main elements of a global link budget in several radiocommunicati
Wireless communication is witnessing tremendous growth with proliferation of different standards covering wide, local and personal area networks (WAN, LAN and PAN). The trends call for designs that allow 1) smooth migration to future generations of wireless standards with higher data rates for multimedia applications, 2) convergence of wireless services allowing access to different standards from the same wireless device, 3) inter-continental roaming. This requires designs that work across multiple wireless standards, can easily be reused, achieve maximum hardware share at a minimum power consumption levels particularly for mobile battery-operated devices.
The Calgary-based firm Alliance is offering optimized billing to oil companies, many of which spend more than $100,000 a month on wireless services for devices such as cellular telephones, pagers and Blackberries. In particular, Alliance is focusing on cutting the cost of wireless for corporate clients by analyzing client-usage patterns and choosing the most cost-efficient rate plans offered by the telecoms. Alliance suggests that do-it-yourself optimization is too complex for the average user, given the very large choice of rate plans. Using algorithms, Alliance software goes through all the wireless service contract options from the telecoms to choose the best plan for a company's needs. Optimizers claim their clients will see significant savings on wireless, in the order to 20 to 50 per cent. This article presented a brief case history of a successful optimization plan for Nabors Canada LP. Alliance allows its clients to view their billing information on their web-based server. Call records can be viewed by device or company division. 1 ref., 1 fig
... Communications System Server Software, Wireless Handheld Devices and Battery Packs; Notice of Investigation... within the United States after importation of certain wireless communications system server software... certain wireless communications system server software, wireless handheld devices or battery packs that...
... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-706] In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld Devices and Battery Packs: Notice of Commission... United States after importation of certain wireless communications system server software, wireless...
In this thesis we present design and tooling solutions as well as network protocols to support application experts in the entire development life-cycle of wireless sensor networks. The complete life-cycle of wireless sensor networks starts with the user/application requirement analysis. It then goes
Full Text Available In this research work we propose a new approach to estimate the number of passengers in a public transportation and determinate the users’ route path based on a passive approach without user intervention. The method is based on the probe requests of users mobile device through the collected data in wireless access point. This data is manipulated to extract the information about the numbers of users with mobile devices and track their route path and time. This data can be manipulated to extract useful knowledge related with users’ habits at public transportation and extract user mobility patterns.
Konstantas, Dimitri; Villalba, Alfredo; di Marzo Serugendo, Giovanna
. In this paper we present two novel mobile and wireless collaborative services and concepts, the Hovering Information, a mobile, geo-referenced content information management system, and the QoS Information service, providing user observed end-to-end infrastructure geo-related QoS information....
E. E. Tsiropoulou
Full Text Available In this paper a joint resource allocation problem is studied in a multi-service Single Carrier FDMA (SC-FDMA wireless network. Mobile users request various services with different Quality of Service (QoS characteristics and they determine in a distributed and non-cooperative manner a joint subcarrier and power allocation towards fulfilling their QoS prerequisites. Initially, a well-designed utility function is formulated to appropriately represent users’ diverse QoS prerequisites with respect to their requested service. The subcarriers allocation problem is solved based on a multilateral bargaining model, where users are able to select different discount factors to enter the bargaining game, thus better expressing their different needs in system resources with respect to their requested service. The subcarriers mapping is realized based either on the localized SC-FDMA method where the subcarriers are sequentially allocated to the users or the distributed SC-FDMA via considering the maximum channel gain policy, where each subcarrier is allocated to the user with the maximum channel gain. Given the subcarriers assignment, an optimization problem with respect to users’ uplink transmission power is formulated and solved, in order to determine the optimal power allocation per subcarrier assigned to each user. Finally, the performance of the proposed framework is evaluated via modeling and simulation and extensive numerical results are presented.
Cardei, Mihaela; Du, Ding-Zhu
This is the first book that provides readers with a deep technical overview of recent advances in resource management for wireless networks at different layers of the protocol stack. The subject is explored in various wireless networks, such as ad hoc wireless networks, 3G/4G cellular, IEEE 802.11, and Bluetooth personal area networks.Survey chapters give an excellent introduction to key topics in resource management for wireless networks, while experts will be satisfied by the technical depth of the knowledge imparted in chapters exploring hot research topics.The subject area discussed in this book is very relevant today, considering the recent remarkable growth of wireless networking and the convergence of wireless personal communications, internet technologies and real-time multimedia.This volume is a very good companion for practitioners working on implementing solutions for multimedia and Quality of Service - sensitive applications over wireless networks.Written for:Researchers, faculty members, students...
Full Text Available Wireless LAN (WLAN technology is developing rapidly with the help of wireless communication technology and social demand. During the development of WLAN, the security is more and more important, and wireless monitoring and shielding are of prime importance for network security. In this paper, we have explored various security issues of IEEE 802.11 based wireless network and analyzed numerous problems in implementing the wireless monitoring and shielding system. We identify the challenges which monitoring and shielding system needs to be aware of, and then provide a feasible mechanism to avoid those challenges. We implemented an actual wireless LAN monitoring and shielding system on Maemo operating system to monitor wireless network data stream efficiently and solve the security problems of mobile users. More importantly, the system analyzes wireless network protocols efficiently and flexibly, reveals rich information of the IEEE 802.11 protocol such as traffic distribution and different IP connections, and graphically displays later. Moreover, the system running results show that the system has the capability to work stably, and accurately and analyze the wireless protocols efficiently.
Oakley, D.J.; Jones, K.G.; Morrison, A.; Burdis, I.
Increasing environmental constraints on the use of oil-based drilling fluids have prompted close cooperation between operators and service companies to maintain the technical performance of drilling fluids while reducing oil discharge. This paper describes how Amerada Hess Ltd. (AHL) and Intl. Drilling Fluids Ltd. (IDF) cooperated by extending laboratory developments into controlled field trials and how feedback from the field has allowed rapid progress toward performance and ecological goals. The authors developed a novel, oil-free, highly inhibitive water-based drilling fluid. The inhibition offered by this fluid approaches that offered by oil-based fluids. Second, the authors developed invert-emulsion and direct-emulsion fluids with low oil/water ratios for low oil-on-cuttings applications. The cooperative process improved the technical performance of these fluids demonstrably and reduced the oil on cuttings
Barbieri, Thimoty; Paolini, Paolo
Cooperation Metaphors are sets of rules to support interaction and collaboration between users who want to explore complex content and information together. The rules determine how the collaborative community can be created and managed, how members of the community can operate on their own, or cooperate with other members. Different types of…
A monitoring system based on wireless sensor network is established, aiming at the difficulty of information acquisition in the orchard on the hill at present. The temperature and humidity sensors are deployed around fruit trees to gather the real-time environmental parameters, and the wireless communication modules with self-organized form, which transmit the data to a remote central server, can realize the function of monitoring. By setting the parameters of data intelligent analysis judgment, the information on remote diagnosis and decision support can be timely and effectively feed back to users.
Mino, E.; Luo, Jijun; Tragos, E.
The concept of ubiquitous and scalable system is applied in the IST WINNER II  project to deliver optimum performance for different deployment scenarios, from local area to wide area wireless networks. The integration in a unique radio system of a cellular and local area type networks supposes...... a great advantage for the final user and for the operator, compared with the current situation, with disconnected systems, usually with different subscriptions, radio interfaces and terminals. To be a ubiquitous wireless system, the IST project WINNER II has defined three system modes. This contribution...
Need new technologies to reliably and safely have humans interact within sensored environments (integrated user interfaces, physical and cognitive augmentation, training, and human-systems integration tools). Areas of focus include: radio frequency identification (RFID), motion tracking, wireless communication, wearable computing, adaptive training and decision support systems, and tele-operations. The challenge is developing effective, low cost/mass/volume/power integrated monitoring systems to assess and control system, environmental, and operator health; and accurately determining and controlling the physical, chemical, and biological environments of the areas and associated environmental control systems.
Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip
Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.
Bapp, F.; Becker, J.; Beyerer, Jürgen; Doll, J.; Filsinger, Max; Frese, Christian; Hubschneider, C.; Lauber, A.; Müller-Quade, J.; Pauli, M.; Roschani, Masoud; Salscheider, O.; Rosenhahn, B.; Ruf, Miriam; Stiller, C.
This paper presents a hacking risk arising in fully automated cooperative driving. As opposed to common cyber risk scenarios, this scenario does not require internal access to an automated car at all, and is therefore largely independent of current on-board malware protection. A hacker uses a wireless mobile device, for example a hacked smartphone, to send vehicle to- vehicle (V2V) signals from a human-driven car, masquerading it as a fully-automated, cooperating vehicle. It deliberately enga...
, cooperation appeared as the continuous reworking of contradictions in the local arrangement of societal con- ditions. Subjects were distributed and distributed themselves according to social privileges, resources, and dilemmas in cooperation. Here, the subjects’ activities and understandings took form from...... each other, their dilemmas, and their previous experience. This meant that they had each their perspective on ongoing praxis. Three observations from the collaboration in the control room are presented, one on stabilizing the function of an object, another on standardizing a procedure, and one...
The present disclosure relates to system applications of multicore optical fibers. One embodiment relates to a base transceiver station for a wireless telecommunication system comprising a plurality of antenna units arranged in a MIMO configuration and adapted for transmission and/or reception...
... by networking techniques across multiple layers. The topics covered include network deployment, localization, time synchronization, wireless radio characteristics, medium-access, topology control, routing, data-centric techniques, and transport protocols. Ideal for researchers and designers seeking to create new algorithms and protocols and enginee...
Full Text Available This paper presents the design of a wireless remote control system based on the ZigBee communication protocol. Gathering data from sensors or performing control tasks through wireless communication is advantageous in situations in which the use of cables is impractical. An Atmega328 microcontroller (from slave device is used for gathering data from the sensors and transmitting it to a coordinator device with the help of the XBee modules. The ZigBee standard is suitable for low-cost, low-data-rate and low-power wireless networks implementations. The XBee-PRO module, designed to meet ZigBee standards, requires minimal power for reliable data exchange between devices over a distance of up to 1600m outdoors. A key component of the ZigBee protocol is the ability to support networking and this can be used in a wireless remote control system. This system may be employed e.g. to control temperature and humidity (SHT11 sensor and light intensity (TSL230 sensor levels inside a commercial greenhouse.
Sheldon, Frederick T [ORNL; Weber, John Mark [Dynetics, Inc.; Yoo, Seong-Moo [University of Alabama, Huntsville; Pan, W. David [University of Alabama, Huntsville
Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA, allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.
This book presents a comprehensive overview of the state of the art in Networked Music Performance (NMP) and a historical survey of computer music networking. It introduces current technical trends in NMP and technical issues yet to be addressed. It also lists wireless communication protocols and compares these to the requirements of NMP. Practical use cases and advancements are also discussed.
Charilas, Dimitris E.; Panagopoulos, Athanasios D.; Vlacheas, Panagiotis; Markaki, Ourania I.; Constantinou, Philip
Congestion avoidance control refers to controlling the load of the network by restricting the admission of new user’s sessions and resolving the unwanted overload situations. Admission control and Load control constitute key mechanisms regarding Radio Resource Management. As the wireless world is moving towards heterogeneous wireless networks, these types of control are facing more challenges, since efficiency and fairness are required. Game theory provides an appropriate framework for formulating fair and efficient congestion avoidance control problems. In this paper we formulate a non-cooperative game between service providers and customers. On the one hand, the service providers wish to maximize their revenue, but on the other hand, the users wish to maximize the quality of service received, keeping at the same time the expenses as low as possible. Therefore a balance has to be established among these contradictory demands. Our effort also concentrates in the proper modeling of the user’s level of satisfaction, so as to provide a logical decision-taking framework. The proposed scheme is then tested using the ns2 simulator. Results show that both parties can benefit from this mechanism.
Miller, Robert D.
NASA has been interested in wireless communications for many years, especially when the crew size of the International Space Station (ISS) was reduced to two members. NASA began a study to find ways to improve crew efficiency to make sure the ISS could be maintained with limited crew capacity and still be a valuable research testbed in Low-Earth Orbit (LEO). Currently the ISS audio system requires astronauts to be tethered to the audio system, specifically a device called the Audio Terminal Unit (ATU). Wireless communications would remove the tether and allow astronauts to freely float from experiment to experiment without having to worry about moving and reconnecting the associated cabling or finding the space equivalent of an extension cord. A wireless communication system would also improve safety and reduce system susceptibility to Electromagnetic Interference (EMI). Safety would be improved because a crewmember could quickly escape a fire while maintaining communications with the ground and other crewmembers at any location. In addition, it would allow the crew to overcome the volume limitations of the ISS ATU. This is especially important to the Portable Breathing Apparatus (PBA). The next generation of space vehicles and habitats also demand wireless attention. Orion will carry up to six crewmembers in a relatively small cabin. Yet, wireless could become a driving factor to reduce launch weight and increase habitable volume. Six crewmembers, each tethered to a panel, could result in a wiring mess even in nominal operations. In addition to Orion, research is being conducted to determine if Bluetooth is appropriate for Lunar Habitat applications.
A number of college and university consortia have embarked on international educational cooperation ventures, providing valuable experiences and benefits for faculty, students, alumni, and the community. For these programs to be effective, they must have high-level institutional support, equal opportunities to participate, effective marketing and…
Benedetto, Sergio; Luise, Marco
The Book contains the Vision of the researchers of the European Network of Excellence NEWCOM++ (Network of Excellence on Wireless COMmunication) on the present and future status of Wireless Communication Networks. In its content, the community of NEWCOM++ researchers, shaped under the common ground of a mainly academic network of excellence, have distilled their scientific wisdom in a number of areas characterized by the common denominator of wireless communications, by identifying the medium-long term research tendencies/problems, describing the tools to face them and providing a relatively large number of references for the interested reader. The identified areas and the researchers involved in their redaction reflect the intersection of the major topics in wireless communications with those that are deeply investigated in NEWCOM++; they are preceded by an original description of the main trends in user/society needs and the degree of fulfilment that ongoing and future wireless communications standard...
Zhang, Ruonan; Pan, Jianping
This brief offers a valuable resource on principles of quality-of-service (QoS) provisioning and the related link-layer resource management techniques for high data-rate wireless networks. The primary emphasis is on protocol modeling and analysis. It introduces media access control (MAC) protocols, standards of wireless local area networks (WLANs), wireless personal area networks (WPANs), and wireless body area networks (WBANs), discussing their key technologies, applications, and deployment scenarios. The main analytical approaches and models for performance analysis of the fundamental resource scheduling mechanisms, including the contention-based, reservation-based, and hybrid MAC, are presented. To help readers understand and evaluate system performance, the brief contains a range of simulation results. In addition, a thorough bibliography provides an additional tool. This brief is an essential resource for engineers, researchers, students, and users of wireless networks.
Cavalcante, Lucas Costa Pereira; Vegas Olmos, Juan José; Tafur Monroy, Idelfonso
Seamless convergence of fiber-optic and the wireless networks is of great interest for enabling transparent delivery of broadband services to users in different locations, including both metropolitan and rural areas. Current demand of bandwidth by end-users, especially using mobile devices, is se...
Stefanovic, Cedomir; Trillingsgaard, Kasper Fløe; Kiilerich Pratas, Nuno
We propose a contention-based random-access protocol, designed for wireless networks where the number of users is not a priori known. The protocol operates in rounds divided into equal-duration slots, performing at the same time estimation of the number of users and resolution...
Pandi, Sreekrishna; Fitzek, Frank; Pihl, Jeppe
This paper demonstrates the quick prototyping capabilities of the Python-Kodo library for network coding based performance evaluation and investigates the problem of data redundancy in a network coded wireless mesh with opportunistic overhearing. By means of several wireless meshed architectures...... of appropriate relays. Finally, various sending policies that can be employed by the nodes in order to improve the overall transmission efficiency in a dynamic wireless mesh network are discussed and their performance is analysed on the constructed simulation setup....... simulated on the constructed test-bed, the advantage of network coding over state of the art routing schemes and the challenges of this new technology are shown. By providing maximum control of the network coding parameters and the simulation environment to the user, the test-bed facilitates quick...
Full Text Available Combining tiny sensors and wireless communication technology, wireless body area network (WBAN is one of the most promising fields. Wearable and implantable sensors are utilized for collecting the physiological data to achieve continuously monitoring of people’s physical conditions. However, due to the openness of wireless environment and the significance and privacy of people’s physiological data, WBAN is vulnerable to various attacks; thus, strict security mechanisms are required to enable a secure WBAN. In this article, we mainly focus on a survey on the security issues in WBAN, including securing internal communication in WBAN and securing communication between WBAN and external users. For each part, we discuss and identify the security goals to be achieved. Meanwhile, relevant security solutions in existing research on WBAN are presented and their applicability is analyzed.
Hervás, Ramón; Nava, Salvador W.; Fontecha, Jesús; Casero, Gregorio; Laguna, Javier; Bravo, José
Context-awareness offers opportunities in proactive adaptation of visualization services. The acquisition and representation of the user situation can better support the cooperative tasks, adapting the interactive services at run-time. This paper proposes a formal context model, based on Semantic Web languages, and providing interoperation between heterogeneous services and mechanisms for a dynamic definition of user interfaces.
Full Text Available In recent years, organizations use IEEE 802.15.4 and ZigBee technology to deliver solution in variety areas including home environment monitoring. ZigBee technology has advantages on low-cost, low power consumption and self-forming. With the rapid expansion of the Internet, there is the requirement for remote monitoring large-scale railway maintenance equipment cab. This paper discusses the disadvantages of the existing smart monitoring system, and proposes a solution. A ZigBee wireless sensor network smart monitoring system and Wi-Fi network is integrated through a home gateway to increase the system flexibility. At the same time the home gateway cooperated with a pre- processing system provide a flexible user interface, and the security and safety of the smart monitoring system. To testify the efficiency of the proposed system, the temperature and humidity sensors and light sensors have developed and evaluated in the smart monitoring system.
Shawky, Ahmed; Bergheim, Hans; Ragnarsson, Ólafur
The number of users in wireless WANs is increasing like never before, at the same time as the bandwidth demands by users increase.The structure of the third generation Wireless WANs makes it expensive for Wireless ISPs to meet these demands.The FUTON architecture is a RoF heterogeneous wireless...... network architecture under development,that will be cheaper to deploy and operate.This paper shows a method to plan an implementation of this architecture.The planning is done as automatic as possible,covering radio planning, ﬁber planning and network dimensioning. The out come of the paper is a planning...... process that uses GIS-data to automate planning for the entire architecture.The automated model uses a collection of scripts that can easily be modiﬁed for planning a FUTON architecture anywhere. The scripts are made using functions for the different tasks, inorder to make them easy to extend and modify....
Computer Security Team
Following our article entitled “Jekyll or Hyde? Better browse securely” in the last issue of the Bulletin, some people wondered why the CERN wireless network is not encrypted… There are many arguments why it is not. The simplest is usability: the communication and management of the corresponding access keys would be challenging given the sheer number of wireless devices the CERN network hosts. Keys would quickly become public, e.g. at conferences, and might be shared, written on whiteboards, etc. Then there are all the devices which cannot be easily configured to use encryption protocols - a fact which would create plenty of calls to the CERN Service Desk… But our main argument is that wireless encryption is DECEPTIVE. Wireless encryption is deceptive as it only protects the wireless network against unauthorised access (and the CERN network already has other means to protect against that). Wireless encryption however, does not really help you. You ...
Johannsen, Carl Gustav Viggo
Segmentation of users can help libraries in the process of understanding user similarities and differences. Segmentation can also form the basis for selecting segments of target users and for developing tailored services for specific target segments. Several approaches and techniques have been...... segmentation project using computer-generated clusters. Compared to traditional marketing texts, this article also tries to identify user segments or images or metaphors by the library profession itself....
Full Text Available An essential application of wireless sensor networks is to successfully respond to user queries. Query packet losses occur in the query dissemination due to wireless communication problems such as interference, multipath fading, packet collisions, etc. The losses of query messages at sensor nodes result in the failure of sensor nodes reporting the requested data. Hence, the reliable and successful dissemination of query messages to sensor nodes is a non-trivial problem. The target of this paper is to enable highly successful query delivery to sensor nodes by localized and energy-efficient discovery, and recovery of query losses. We adopt local and collective cooperation among sensor nodes to increase the success rate of distributed discoveries and recoveries. To enable the scalability in the operations of discoveries and recoveries, we employ a distributed name resolution mechanism at each sensor node to allow sensor nodes to self-detect the correlated queries and query losses, and then efficiently locally respond to the query losses. We prove that the collective discovery of query losses has a high impact on the success of query dissemination and reveal that scalability can be achieved by using the proposed approach. We further study the novel features of the cooperation and competition in the collective recovery at PHY and MAC layers, and show that the appropriate number of detectors can achieve optimal successful recovery rate. We evaluate the proposed approach with both mathematical analyses and computer simulations. The proposed approach enables a high rate of successful delivery of query messages and it results in short route lengths to recover from query losses. The proposed approach is scalable and operates in a fully distributed manner.
This brief explores current research on dynamic spectrum auctions, focusing on fundamental auction theory, characteristics of the spectrum market, spectrum auction architecture and possible auction mechanisms. The brief explains how dynamic spectrum auctions, which enable new users to gain spectrum access and existing spectrum owners to obtain financial benefits, can greatly improve spectrum efficiency by resolving the artificial spectrum shortage. It examines why operators and users face significant challenges due to specialty of the spectrum market and the related requirements imposed on the auction mechanism design. Concise and up-to-date, Dynamic Spectrum Auction in Wireless Communication is designed for researchers and professionals in computer science or electrical engineering. Students studying networking will also find this brief a valuable resource.
Tragos, Elias; Mihovska, Albena D.; Mino, Emilio
The concept of ubiquitous and scalable system is applied in the IST WINNER II  project to deliver optimum performance for different deployment scenarios from local area to wide area wireless networks. The integration of cellular and local area networks in a unique radio system will provide...... a great advantage to final users and operators, compared with the nowadays situation with many disconnected systems and users equipped with different subscriptions, radio interfaces and terminals. To this issue, the IST project WINNER II has defined three system modes suited to local, metropolitan...... and wide area respectively. The aim of this paper is twofold: first, it presents an architectural solution for scalable and hybrid radio resource management to efficiently integrate the different WINNER modes; second, it proposes a hybrid handover mechanism to exploit the availability of the different...
In the contemporary world, engineers and designers face huge challenges as they shift towards novel organizational concepts such as ‘concurrent engineering’ in order to manage increasing product diversity so as to satisfy customer demands while trying to accelerate the design process to deal...... with the competitive realities of a global market and decreasing product life cycles. In this environment, the coordination and integration of the myriads of interdependent and yet distributed and concurrent design activities becomes enormously complex. It thus seems as if CSCW technologies may be indispensable...... if concurrent engineering is to succeed. On the basis of ethnographic studies of cooperative design, the paper attempts to characterize cooperative work in the domain of design and to outline a set of crucial research problems to be addressed if CSCW is to help engineers and de-signers meet the challenges...
Han, Zhu; Saad, Walid
This book provides the fundamental knowledge of the classical matching theory problems. It builds up the bridge between the matching theory and the 5G wireless communication resource allocation problems. The potentials and challenges of implementing the semi-distributive matching theory framework into the wireless resource allocations are analyzed both theoretically and through implementation examples. Academics, researchers, engineers, and so on, who are interested in efficient distributive wireless resource allocation solutions, will find this book to be an exceptional resource. .
... technologies in providing broadband services today, emerging wireless broadband technologies are expected to significantly increase their market share over the next years, Deploying a wireless network...
National Aeronautics and Space Administration — Recognizing the needs and challenges facing NASA Earth Science for data input, manipulation and distribution, Mobitrum is proposing a ? Wireless Sensor Portal...
National Aeronautics and Space Administration — Wireless technologies are an increasingly attractive means for spatial data, input, manipulation, and distribution. Mobitrum is proposing an innovative Adaptive...
Smart homes are further development of intelligent buildings and home automation, where context awareness and autonomous behaviour are added. They are based on a combination of the Internet and emerging technologies like wireless sensor nodes. These wireless sensor nodes are challenging because....... This paper introduces an approach that considerably lowers the wireless sensor node power consumption and the amount of transmitted sensor events. It uses smart objects that include artificial intelligence to efficiently process the sensor event on location and thereby saves the costly wireless...
. This paper introduces an approach that considerably lowers the wireless sensor node power consumption and the amount of transmitted sensor events. It uses smart objects that include artificial intelligence to efficiently process the sensor event on location and thereby saves the costly wireless......Smart homes are further development of intelligent buildings and home automation, where context awareness and autonomous behaviour are added. They are based on a combination of the Internet and emerging technologies like wireless sensor nodes. These wireless sensor nodes are challenging because...
Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho
User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that th...
FROILAN G. DESTREZA
Full Text Available This study is for the BSHRM Students of Batangas State University (BatStateU ARASOF for the researchers believe that the Wireless 3D Chocolate Printer would be helpful in their degree program especially on making creative, artistic, personalized and decorative chocolate designs. The researchers used the Prototyping model as procedural method for the successful development and implementation of the hardware and software. This method has five phases which are the following: quick plan, quick design, prototype construction, delivery and feedback and communication. This study was evaluated by the BSHRM Students and the assessment of the respondents regarding the software and hardware application are all excellent in terms of Accuracy, Effecitveness, Efficiency, Maintainability, Reliability and User-friendliness. Also, the overall level of acceptability of the design project as evaluated by the respondents is excellent. With regard to the observation about the best raw material to use in 3D printing, the chocolate is good to use as the printed material is slightly distorted,durable and very easy to prepare; the icing is also good to use as the printed material is not distorted and is very durable but consumes time to prepare; the flour is not good as the printed material is distorted, not durable but it is easy to prepare. The computation of the economic viability level of 3d printer with reference to ROI is 37.14%. The recommendation of the researchers in the design project are as follows: adding a cooling system so that the raw material will be more durable, development of a more simplified version and improving the extrusion process wherein the user do not need to stop the printing process just to replace the empty syringe with a new one.
Full Text Available This paper presents the testing results of a wireless sensor communication system with low power consumption integrated with an energy harvesting power source. The experiments focus on the system’s capability to perform continuous monitoring and to wirelessly transmit the data acquired from the sensors to a user base station, for realization of completely battery-free wireless sensor system. Energy harvesting technologies together with system design optimization for power consumption minimization ensure the system’s energy autonomous capability demonstrated in this paper by presenting the promising testing results achieved following its integration with structural health monitoring and body area network applications.
Although it sounds like a nonvital tooth, Bluetooth is actually one of technology's hottest trends. It is an industrial specification for wireless personal area networks, but for a busy orthodontic practice, it translates to freedom from cables and cords. Despite its enigmatic name, Bluetooth-based devices and the wireless technology that these gadgets work with are here to stay. They promise to make life easier for the electronic-device users of all stripes, and orthodontists are no exception. The purpose of this article is to orient orthodontists, office staff, and auxiliary personnel to this universal wireless technology that is slowly becoming an integral part of every office.
Feng, Zhiyong; Zhang, Ping
This brief examines the current research in cognitive wireless networks (CWNs). Along with a review of challenges in CWNs, this brief presents novel theoretical studies and architecture models for CWNs, advances in the cognitive information awareness and delivery, and intelligent resource management technologies. The brief presents the motivations and concepts of CWNs, including theoretical studies of temporal and geographic distribution entropy as well as cognitive information metrics. A new architecture model of CWNs is proposed with theoretical, functional and deployment architectures suppo
Full Text Available Recently, wireless network technologies were designed for most of the applications. Congestion raised in the wireless network degrades the performance and reduces the throughput. Congestion-free network is quit essen- tial in the transport layer to prevent performance degradation in a wireless network. Game theory is a branch of applied mathematics and applied sciences that used in wireless network, political science, biology, computer science, philosophy and economics. e great challenges of wireless network are their congestion by various factors. E ective congestion-free alternate path routing is pretty essential to increase network performance. Stackelberg game theory model is currently employed as an e ective tool to design and formulate conges- tion issues in wireless networks. is work uses a Stackelberg game to design alternate path model to avoid congestion. In this game, leaders and followers are selected to select an alternate routing path. e correlated equilibrium is used in Stackelberg game for making better decision between non-cooperation and cooperation. Congestion was continuously monitored to increase the throughput in the network. Simulation results show that the proposed scheme could extensively improve the network performance by reducing congestion with the help of Stackelberg game and thereby enhance throughput.
Huleihel, Wasim; Steinberg, Yossef
It is well known that cooperation between users in a communication network can lead to significant performance gains. A common assumption in past works is that all the users are aware of the resources available for cooperation, and know exactly to what extent these resources can be used. Unfortunately, in many modern communication networks the availability of cooperation links cannot be guaranteed a priori, due to the dynamic nature of the network. In this work a family of models is suggested...
Medical information has been transmitted using wireless technologies for almost 80 years. A "wired wireless" electronic stethoscope was developed by the U.S. Army Signal Corps in the early 1920's, for potential use in ship-to-shore transmission of cardiac sounds. [Winters SR. Diagnosis by wireless. Scientific American June 11, 1921, p. 465] Today, wireless is used in a wide range of medical applications and at sites from transoceanic air flights to offshore oil platforms to Mt. Everest. 'Wireless LANs' are often used in medical environments. Typically, nurses and physicians in a hospital or clinic use hand-held "wireless thin client" pen computers that exchange patient information and images with the hospital server. Numerous companies, such as Fujitsu (article below) and Cruise Technologies (www.cruisetech.com) manufacture handheld pen-entry computers. One company, LXE, integrates radio-frequency (RF) enhanced hand-held computers specifically designed for production use within a wireless LAN (www.lxe.com). Other companies (Proxim, Symbol, and others) supply the wireless RF LAN infrastructure for the enterprise. Unfortunately, there have been problems with widespread deployment of wireless LANs. Perhaps the biggest impediment has been the lack of standards. Although an international standard (IEEE 802.11) was adopted in 1997, most wireless LAN products still are not compatible with the equipment of competing companies. A problem with the current standard for LAN adapters is that throughput is limited to 3 Mbps--compared to at least 10 Mbps, and often 100 Mbps, in a hard-wired Ethernet LAN. An II Mbps standard is due out in the next year or so, but it will be at least 2 years before standards-compliant products are available. This story profiles some of the ways that wireless is being used to overcome gaps in terrestrial and within-enterprise communication.
Garcia Navajas, G.
Autonomous heliostats fields are a priority objective long time pursued by PSA. Removal of all the electric cables, trenches and related components will really mean an important cosi reduction in civil works and investment for future Solar Thermal Power Plants. Several previous developments have been required before making autonomous-heliostat fields an eventual reality. First, a new local control has been designed to adapt all heliostat components to work on 24Vdc supplied by a photovoltaic panel. Second, a specific radio modem has been designed for wireless Communications. In April 1999, the first autonomous heliostat was started up and main results were reported at the 10 SolarPACES International Symposium. The objective, fixed within the project SIREC fimded with theFEDER European Regional Development Program, has been to scale these concepts to a mini-field to demonstrate the feasibility of the wireless communication and operation with 20 MBB heliostats located at the North side of CRS facilities of PSA. A specific radio modem has been designed for this application thanks to the scientific cooperation agreement between the University of Almeria and CIEMAT. 50% of the heliostat field has been implemented with a commercial radio-modem and the other 50% with specific radio-modems to compare the performance and capabilities. The capacities of both systems will be analysed and the main data obtained from the test campaign carried out, will be showed. (Author) 12 refs
Full Text Available Ambient Intelligence is a vision in which various devices come together and process information from multiple sources in order to exert control on the physical environment. In addition to computation and control, communication plays a crucial role in the overall functionality of such a system. Wireless Sensor Networks are one such class of networks, which meet these criteria. These networks consist of spatially distributed sensor motes which work in a co-operative manner to sense and control the environment. In this work, an implementation of an energy-efficient and cost-effective, wireless sensor networks based vehicle parking system for a multi-floor indoor parking facility has been introduced. The system monitors the availability of free parking slots and guides the vehicle to the nearest free slot. The amount of time the vehicle has been parked is monitored for billing purposes. The status of the motes (dead/alive is also recorded. Information like slot allocated, directions to the slot and billing data is sent as a message to customer’s mobile phones. This paper extends our previous work 1 with the development of a low cost sensor mote, about one tenth the cost of a commercially available mote, keeping in mind the price sensitive markets of the developing countries.
. Security and privacy are rapidly replacing performance as the first and foremost concern in many sensor networking scenarios. While security prevention is important, it cannot guarantee that attacks will not be launched and that, once launched, they will not be successful. Therefore, detection of malicious...... intrusions forms an important part of an integrated approach to network security. In this work, we start by considering the problem of cooperative intrusion detection in WSNs and develop a lightweight ID system, called LIDeA, which follows an intelligent agent-based architecture. We show how such a system...... networks are. Motivated by this unexplored security aspect, we investigate a new set of memory related vulnerabilities for sensor embedded devices that, if exploited, can lead to the execution of software-based attacks. We demonstrate how to execute malware on wireless sensor nodes that are based...
Kustiawan, I.; Purnama, W.
Seamless mobility and service continuity anywhere at any time are an important issue in the wireless Internet. This research proposes a scheme to make handoff decisions effectively in heterogeneous wireless networks using a fuzzy system. Our design lies in an inference engine which takes RSS (received signal strength), data rate, network latency, and user preference as strategic determinants. The logic of our engine is realized on a UE (user equipment) side in faster reaction to network dynamics while roaming across different radio access technologies. The fuzzy system handles four metrics jointly to deduce a moderate decision about when to initiate handoff. The performance of our design is evaluated by simulating move-out mobility scenarios. Simulation results show that our scheme outperforms other approaches in terms of reducing unnecessary handoff.
Vagstad, Martin Nybø; Haugsdal, Erlend Børslid
This project describes the current state for wireless networks with regard to real-time multiplayer games on mobile devices. It looks at the limitations of these networks and mechanics to reduce the impact of the introduced network latency. The goal is to find an implementation where the user is not able to distinguish between an offline, perfect version and an online version where the user plays against other users in real time. To find this implementations the authors discuss the ch...
Liu, Q.; Golinnski, M.; Pawelczak, P.; Warnier, M.
wireless power transfer network (WPTN) aims to support devices with cable-less energy on-demand. Unfortunately, wireless power transfer itself-especially through radio frequency radiation rectification-is fairly inefficient due to decaying power with distance, antenna polarization, etc.
First page Back Continue Last page Overview Graphics. Wireless Networks: a brief introduction. Wireless communication: What? Why? How many types? What is cell? Is it different from fixed landline structure? 1G systems: FDMA/FDD and Analog FM [voice comm]. (Introduced in 1983 in Chicago by AMPS). 2G systems: 3 ...
Mobile robots and Wireless Sensor Networks (WSNs) have enabled great potentials and a large space for ubiquitous and pervasive applications. Robotics and WSNs have mostly been considered as separate research fields and little work has investigated the marriage between these two technologies. However, these two technologies share several features, enable common cyber-physical applications and provide complementary support to each other. The primary objective of book is to provide a reference for cutting-edge studies and research trends pertaining to robotics and sensor networks, and in particular for the coupling between them. The book consists of five chapters. The first chapter presents a cooperation strategy for teams of multiple autonomous vehicles to solve the rendezvous problem. The second chapter is motivated by the need to improve existing solutions that deal with connectivity prediction, and proposed a genetic machine learning approach for link-quality prediction. The third chapter presents an arch...
Köbben, B.; van Bunningen, A.H.; Kavitha Muthukrishnan, K.; Stefanakis, Emmanuel
This paper describes a project that has just started at the University of Twente (UT) in cooperation with the International Institute for Geo-Information Science and Earth Observation (ITC) to provide Location Based Services (LBS) for the UT campus. This LBS will run on the existing Wireless Campus
When marrying randomized distributed space-time coding (RDSTC) to geographical routing, new performance horizons can be created. In order to reach those horizons however, routing protocols must evolve to operate in a fully distributed fashion. In this letter, we expose a technique to construct a fully distributed geographical routing scheme in conjunction with RDSTC. We then demonstrate the performance gains of this novel scheme by comparing it to one of the prominent classical schemes.
The operation of nuclear power plants near national borders requires a close bilateral co-operation to cope with accidents having off-site radiological impacts. For example in 1978 such an agreement was signed by the German and Swiss government. The accident at the Chernobyl NPP changed the international co-operation in the framework of international consequence management. International conventions were agreed to insure a timely notification and international assistance in case of an accident with transboundary effects. In order to fulfill these conventions several procedures were introduced. In addition, bilateral agreements were signed also with countries which are not operating nuclear power plants near national borders. Since then no accident took place that would have required any notification. However, following the experience the expectations to these networks have changed considerably and hence sustainable development is required to cope with new challenges such as long term consequences management, new radiological threats, faster international assistance, media and public concerns, and technical evolution of communications systems. (author)
Porras, Jari; Heikkinen, Kari; Kinnula, Marianne
determined by the era in which they were born. This is due to the fact that digital natives, born in an already “fully” digitalized world with a plethora of ICT services, have a much closer relationship to these solutions than generations before them. This has also shaped the users perspectives and had......The User 2020 vision is of the changing needs and habits of a user in the future digital world. In order to understand the needs of the future users, we need to look at how users and technology have changed during recent years. The different generations of users are products of their own time...... this evolutionary process. The basis of this Outlook lies in studies of user generations. Although it’s controversial to do so, users have been divided into generations based on their ability and willingness to use ICT solutions. Whether the users are digital ‘tourists’, ‘immigrants’ or ‘natives’ is mainly...
tunneling all traffic through a trusted VPN or mix network. SlyFi is an optimization to these solutions when both ends of the wireless link trust each...these techniques have been extremely successful (despite occasional problems [30, 34]) and protocols that use these techniques, such as IPSEC , SSL...through VPNs , the case for several users in the sigcomm trace, the IP addresses of the VPN servers would be revealing. No application or network level
Full Text Available Game theory (GT is a mathematical method that describes the phenomenon of conflict and cooperation between intelligent rational decision-makers. In particular, the theory has been proven very useful in the design of wireless sensor networks (WSNs. This article surveys the recent developments and findings of GT, its applications in WSNs, and provides the community a general view of this vibrant research area. We first introduce the typical formulation of GT in the WSN application domain. The roles of GT are described that include routing protocol design, topology control, power control and energy saving, packet forwarding, data collection, spectrum allocation, bandwidth allocation, quality of service control, coverage optimization, WSN security, and other sensor management tasks. Then, three variations of game theory are described, namely, the cooperative, non-cooperative, and repeated schemes. Finally, existing problems and future trends are identified for researchers and engineers in the field.
Shi, Hai-Yan; Wang, Wan-Liang; Kwok, Ngai-Ming; Chen, Sheng-Yong
Game theory (GT) is a mathematical method that describes the phenomenon of conflict and cooperation between intelligent rational decision-makers. In particular, the theory has been proven very useful in the design of wireless sensor networks (WSNs). This article surveys the recent developments and findings of GT, its applications in WSNs, and provides the community a general view of this vibrant research area. We first introduce the typical formulation of GT in the WSN application domain. The roles of GT are described that include routing protocol design, topology control, power control and energy saving, packet forwarding, data collection, spectrum allocation, bandwidth allocation, quality of service control, coverage optimization, WSN security, and other sensor management tasks. Then, three variations of game theory are described, namely, the cooperative, non-cooperative, and repeated schemes. Finally, existing problems and future trends are identified for researchers and engineers in the field.
Shi, Hai-Yan; Wang, Wan-Liang; Kwok, Ngai-Ming; Chen, Sheng-Yong
Game theory (GT) is a mathematical method that describes the phenomenon of conflict and cooperation between intelligent rational decision-makers. In particular, the theory has been proven very useful in the design of wireless sensor networks (WSNs). This article surveys the recent developments and findings of GT, its applications in WSNs, and provides the community a general view of this vibrant research area. We first introduce the typical formulation of GT in the WSN application domain. The roles of GT are described that include routing protocol design, topology control, power control and energy saving, packet forwarding, data collection, spectrum allocation, bandwidth allocation, quality of service control, coverage optimization, WSN security, and other sensor management tasks. Then, three variations of game theory are described, namely, the cooperative, non-cooperative, and repeated schemes. Finally, existing problems and future trends are identified for researchers and engineers in the field. PMID:23012533
Current trends in mobile services envisage location-based networking as a major strong stimulator for the development of novel solutions for obtaining positioning information in wireless networks. This book discusses mobile positioning solutions applied on top of current wireless communication networks. Moreover, it introduces advanced and novel topics such as localization in heterogeneous and cooperative scenarios. In this fully updated second edition, the authors summarize recent developments in mobile positioning and tracking. Compared with the previous version, the new edition introduces more advanced topics, providing the bridge between research and industry. It works as an important reference and provides good foundations for new researchers.
Mobile applications emerge, driven by the ubiquitous availability of mobile devices and wireless communication infrastructures. They aspire providing mobile services to users anywhere-anytime, while relying their delivery on the best-effort Quality of Service (QoS) of the underlying wireless networks. We examine a technical and business viability of QoS-information system (QoSIS), which, based on Mobile Web 2.0 paradigm for a collaborative sharing of QoS-information for mobile service users, ...
Lau, Wilfred K.; Swanson, Richard; Christensen, Kurt K.
System combines features of pagers, walkie-talkies, and cordless telephones. Wireless headset communication system uses digital modulation on spread spectrum to avoid interference among units. Consists of base station, 4 radio/antenna modules, and as many as 16 remote units with headsets. Base station serves as network controller, audio-mixing network, and interface to such outside services as computers, telephone networks, and other base stations. Developed for use at Kennedy Space Center, system also useful in industrial maintenance, emergency operations, construction, and airport operations. Also, digital capabilities exploited; by adding bar-code readers for use in taking inventories.
St John, Stuart A.
Understanding Physics is a great end in itself, but is also crucial to keep pace with developments in modern technology. Wireless power transfer, known to many only as a means to charge electric toothbrushes, will soon be commonplace in charging phones, electric cars and implanted medical devices. This article outlines how to produce and use a simple set of equipment to both demonstrate and investigate this phenomenon. It presents some initial findings and aims to encourage Physics educators and their students to conduct further research, pushing the bounds of their understanding.
Oteafy, Sharief M A
In this title, the authors leap into a novel paradigm of scalability and cost-effectiveness, on the basis of resource reuse. In a world with much abundance of wirelessly accessible devices, WSN deployments should capitalize on the resources already available in the region of deployment, and only augment it with the components required to meet new application requirements. However, if the required resources already exist in that region, WSN deployment converges to an assignment and scheduling scheme to accommodate for the new application given the existing resources. Such resources are polled
This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...... the speed of technological obsolescence, market share dominance, and the black boxing of technology influence consumer intention to adopt WiMax and 3G wireless internet for their laptop computers. The results, implications for industry, and areas for further research are discussed....
Lim, Hwang Bin
This is divided six parts which are radio regulation law on securing of radio resource, use of radio resource, protection of radio resource, radio regulation enforcement ordinance with securing, distribution and assignment of radio regulation, radio regulation enforcement regulation on utility of radio resource and technical qualification examination, a wireless installation regulation of technique standard and safety facility standard, radio regulation such as certification regulation of information communicative machines and regulation of radio station on compliance of signal security, radio equipment in radio station, standard frequency station and emergency communication.
Zhao, Nan; Wu, Minghu; Xiong, Wei; Liu, Cong
Cooperative relay can effectively improve spectrum efficiency by exploiting the spatial diversity in the wireless networks. However, wireless nodes may acquire different network information with various users’ location and mobility, channels’ conditions, and other factors, which results in asymmetric information between the source and the relay nodes (RNs). In this paper, the relay incentive mechanism between relay nodes and the source is investigated under the asymmetric information. By mode...
Chen, Lei; Zhang, Zihong
Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth
Maglogiannis, Vasilis; Naudts, Dries; Shahid, Adnan; Giannoulis, Spilios; Laermans, Eric; Moerman, Ingrid
On the road towards 5G, a proliferation of Heterogeneous Networks (HetNets) is expected. Sensor networks are of great importance in this new wireless era, as they allow interaction with the environment. Additionally, the establishment of the Internet of Things (IoT) has incredibly increased the number of interconnected devices and consequently the already massive wirelessly transmitted traffic. The exponential growth of wireless traffic is pushing the wireless community to investigate solutions that maximally exploit the available spectrum. Recently, 3rd Generation Partnership Project (3GPP) announced standards that permit the operation of Long Term Evolution (LTE) in the unlicensed spectrum in addition to the exclusive use of the licensed spectrum owned by a mobile operator. Alternatively, leading wireless technology developers examine standalone LTE operation in the unlicensed spectrum without any involvement of a mobile operator. In this article, we present a classification of different techniques that can be applied on co-located LTE and Wi-Fi networks. Up to today, Wi-Fi is the most widely-used wireless technology in the unlicensed spectrum. A review of the current state of the art further reveals the lack of cooperation schemes among co-located networks that can lead to more optimal usage of the available spectrum. This article fills this gap in the literature by conceptually describing different classes of cooperation between LTE and Wi-Fi. For each class, we provide a detailed presentation of possible cooperation techniques that can provide spectral efficiency in a fair manner.
Szu, Harold; Hsu, Charles; Moon, Gyu; Yamakawa, Takeshi; Tran, Binh
We applied Compressive Sensing to design an affordable, convenient Brain Machine Interface (BMI) measuring the high spatial density, and real-time process of Electroencephalogram (EEG) brainwaves by a Smartphone. It is useful for therapeutic and mental health monitoring, learning disability biofeedback, handicap interfaces, and war gaming. Its spec is adequate for a biomedical laboratory, without the cables hanging over the head and tethered to a fixed computer terminal. Our improved the intrinsic signal to noise ratio (SNR) by using the non-uniform placement of the measuring electrodes to create the proximity of measurement to the source effect. We computing a spatiotemporal average the larger magnitude of EEG data centers in 0.3 second taking on tethered laboratory data, using fuzzy logic, and computing the inside brainwave sources, by Independent Component Analysis (ICA). Consequently, we can overlay them together by non-uniform electrode distribution enhancing the signal noise ratio and therefore the degree of sparseness by threshold. We overcame the conflicting requirements between a high spatial electrode density and precise temporal resolution (beyond Event Related Potential (ERP) P300 brainwave at 0.3 sec), and Smartphone wireless bottleneck of spatiotemporal throughput rate. Our main contribution in this paper is the quality and the speed of iterative compressed image recovery algorithm based on a Block Sparse Code (Baranuick et al, IEEE/IT 2008). As a result, we achieved real-time wireless dynamic measurement of EEG brainwaves, matching well with traditionally tethered high density EEG.
Budinger, Thomas F.
This review is divided into three sections: technologies for monitoring physiological parameters; biosensors for chemical assays and wireless communications technologies including image transmissions. Applications range from monitoring high risk patients for heart, respiratory activity and falls to sensing levels of physical activity in military, rescue, and sports personnel. The range of measurements include, heart rate, pulse wave form, respiratory rate, blood oxygen, tissue pCO2, exhaled carbon dioxide and physical activity. Other feasible measurements will employ miniature chemical laboratories on silicon or plastic chips. The measurements can be extended to clinical chemical assays ranging from common blood assays to protein or specialized protein measurements (e.g., troponin, creatine, and cytokines such as TNF and IL6). Though the feasibility of using wireless technology to communicate vital signs has been demonstrated 32 years ago (1) it has been only recently that practical and portable devices and communications net works have become generally available for inexpensive deployment of comfortable and affordable devices and systems.
Fu, Xia-nan; Huang, Lei; Wei, Jian-yan
Ground-based Wide Angle Cameras (GMAC) are the ground-based observational facility for the SVOM (Space Variable Object Monitor) astronomical satellite of Sino-French cooperation, and Mini-GWAC is the pathfinder and supplement of GWAC. In the context of the Mini-GWAC telescope array, this paper introduces the design and implementation of a kind of telescope array control system based on the wireless touch screen platform. We describe the development and implementation of the system in detail in terms of control system principle, system hardware structure, software design, experiment, and test etc. The system uses a touch-control PC which is based on the Windows CE system as the upper computer, while the wireless transceiver module and PLC (Programmable Logic Controller) are taken as the system kernel. It has the advantages of low cost, reliable data transmission, and simple operation. And the control system has been applied to the Mini-GWAC successfully.
Reaching users at local scales: insights into the value of forest inventory information for education and outreach and the potential for an effective partnership between FIA, cooperative extension, and state and national conservation education partners
Forest information is desired for broader applications than we typically serve. Among those underserved users are the education and outreach communities. These groups are actively trying to engage and teach both youth and adults in areas such as GIS/spatial analysis, natural resource education, general math/science, invasive species, climate change, water quality, and...
Lu, Jianhua; Ge, Ning
This brief presents an alternative viewpoint on processing technology for wireless communications based on recent research advances. As a lever in emerging processing technology, the structure perspective addresses the complexity and uncertainty issues found in current wireless applications. Likewise, this brief aims at providing a new prospective to the development of communication technology and information science, while stimulating new theories and technologies for wireless systems with ever-increasing complexity. Readers of this brief may range from graduate students to researchers in related fields.
Signal Hill, California-based XCOM Wireless Inc. developed radio frequency micromachine (RF MEMS) relays with a Phase II Small Business Innovation Research (SBIR) contract through NASA?s Jet Propulsion Laboratory. In order to improve satellite communication systems, XCOM produced wireless RF MEMS relays and tunable capacitors that use metal-to-metal contact and have the potential to outperform most semiconductor technologies while using less power. These relays are used in high-frequency test equipment and instrumentation, where increased speed can mean significant cost savings. Applications now also include mainstream wireless applications and greatly improved tactical radios.
Bojkovic, Zoran; Bakmaz, Bojan
Communication networks play a crucial role in smart grid, as the intelligence of this complex system is built based on information exchange across the power grid. Wireless communications and networking are among the most economical ways to build the essential part of the scalable communication infrastructure for smart grid. In particular, wireless networks will be deployed widely in the smart grid for automatic meter reading, remote system and customer site monitoring, as well as equipment fault diagnosing. With an increasing interest from both the academic and industrial communities, this chapter systematically investigates recent advances in wireless communication technology for the smart grid.
Briere, Danny; Ferris, Edward
The perennial bestseller shows you how share your files and Internet connection across a wireless network. Fully updated for Windows 7 and Mac OS X Snow Leopard, this new edition of this bestseller returns with all the latest in wireless standards and security. This fun and friendly guide shows you how to integrate your iPhone, iPod touch, smartphone, or gaming system into your home network. Veteran authors escort you through the various financial and logisitical considerations that you need to take into account before building a wireless network at home.: Covers the basics of planning, instal
Cruickshank, David B
This practical resource offers you an in-depth, up-to-date understanding of the use of microwave magnetic materials for cutting-edge wireless applications. The book discusses device applications used in wireless infrastructure base stations, point-to-point radio links, and a range of more specialized microwave systems. You find detailed discussions on the attributes of each family of magnetic materials with respect to specific wireless applications. Moreover, the book addresses two of the hottest topics in the field today - insertion loss and intermodulation. This comprehensive reference also
Full Text Available Existing systems to collect temperature and relative humidity data at cultural heritage buildings require technical knowledge by people who are working with it, which is very seldom that they do have. The systems available today also require manual downloading of the collected data from the sensor to a computer for central storage and for further analysis. In this paper a wireless remote sensor network based on the ZigBee technology together with a simplified data collection system is presented. The system does not require any knowledge by the building administrator after the network is deployed. The wireless sensor device will automatically join available network when the user wants to expand the network. The collected data will be automatically and periodically synchronized to a remote main server via an Internet connection. The data can be used for centralized monitoring and other purpose. The power consumption of the sensor module is also minimized and the battery lifetime is estimated up to 10 years.
Lai, Albert Max; Nieh, Jason; Laine, Andrew; Starren, Justin
Organizations are beginning to recognize that health care providers are highly mobile and optimal care requires providing access to a large and dynamic body of information wherever the provider and patient are. Remote display protocols (RDP) are one way that organizations are using to deliver healthcare applications to mobile users. While many organizations have begun to use RDPs to deliver real-time access to health care information to clinicians, little formal work has been done to evaluate the performance or the effectiveness of thin-client computing with health care applications. This study examines the performance of wireless thin-client tablets with two web-based clinical applications, a text-centric, graphics-poor EMR and a graphic-rich image analysis program. The study compares the performance of two popular RDP implementations, Citrix and Microsoft Remote Desktop, with the performance of a traditional web browser in a wireless environment. For both applications, the RDPs demonstrated both higher speed and reduced bandwidth requirements than the web browser.
Full Text Available The rural wireless networks are increasingly in demand by associations and autarchies to expand Internet access in this type of areas. The problem of such solutions centers not only in network deployment and its maintenance, but also in the equipment installation on clients, which always has big costs. This installation and configuration must be performed by a technician on site, so that the equipment can be integrated in the infrastructure. To try to mitigate this problem, it is presented a solution that allows the clients to install, with transparency, the device at home, reducing not only the cost for the management entity but also for the clients. This way, for info-excluded people or with new technology low experience level, it is the user that integrates himself in the network, making him part of the process, fostering the network usage.In this article are specified not only the system architecture but also the way that it works and how it obtains the desirable result. The tests made to the solution show the quickness, reliability and autonomy in the execution of the tasks, making it a benefit for rural wireless networks.This solution, by its robustness and simplicity, allowed an uptake to the IT by people who never thought to do it, namely an advanced age group (elderly who want to join the world of the new technologies
Full Text Available We propose a Decode-and-Forward (DF scheme using distributed Turbo code (DTC for a three-node (source, relay, and destination wireless cooperative communication system. The relay decodes, then interleaves, and reencodes the decoded data. It then forwards the reencoded packet and its instantaneous receive SNR to the destination. The performances using both ideal and quantized SNR are studied. The destination uses a modified metric within a Turbo decoding algorithm to scale the soft information calculated for the relay code. The proposed scheme is simple to implement and performs well.
McCown, Steven H [Rigby, ID; Derr, Kurt W [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID
Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.
Europe is certainly the part of the world where the largest number of international arrangements have been established for dealing with international cooperation in cases of major oil spills at sea. Let me list the most important of these multilateral arrangements: Bonn Agreement: covers the North Sea Contracting Parties: riparian states and the EEC Barcelona Convention: (protocol for emergency situations) covers the Mediterranean Sea Contracting Parties: riparian states and the EEC; Helsinki Convention: covers the Baltic Sea Contracting Parties: riparian states and (soon) the EEC; Lisbon Agreement: covers the NE Atlantic Contracting Parties: France, Spain, Portugal, Morocco and the EEC; Community Action Plan: covers the whole community waters; EEC; Members States participate in this plan. It should be underlined that, in addition to these large multilateral agreements a number of bilateral or trilateral arrangements have been set up, such as the Copenhagen Agreement, Denger Plan, Manche Plan, etc. The Commission involvement in these international frameworks is very important: as an example, it is presently chairing the Bonn Agreement Contracting Parties meeting. In addition, being the only contracting party to all these agreements, it is able to play a unique role of coordination and information to avoid duplications and contradictions. Having given this overview, I would now focus on the Community Action Plan
Full Text Available Along with the in-depth application of sensor networks, the security issues have gradually become the bottleneck of wireless sensor applications. To provide a solution for security scheme is a common concern not only of researchers but also of providers, integrators and users of wireless sensor networks. Based on this demand, this paper focuses on the research of strengthening the security of cluster-based wireless sensor networks. Based on the systematic analysis of the clustering protocol and its security enhancement scheme, the paper introduces the broadcast authentication scheme, and proposes an SA-LEACH network security enhancement protocol. The performance analysis and simulation experiments prove that the protocol consumes less energy with the same security requirements, and when the base station is comparatively far from the network deployment area, it is more advantageous in terms of energy consumption and t more suitable for wireless sensor networks.
Full Text Available Recent developments in the area of micro-sensor devices have accelerated advances in the sensor networks field leading to many new protocols specifically designed for wireless sensor networks (WSNs. Wireless sensor networks with hundreds to thousands of sensor nodes can gather information from an unattended location and transmit the gathered data to a particular user, depending on the application. These sensor nodes have some constraints due to their limited energy, storage capacity and computing power. Data are routed from one node to other using different routing protocols. There are a number of routing protocols for wireless sensor networks. In this review article, we discuss the architecture of wireless sensor networks. Further, we categorize the routing protocols according to some key factors and summarize their mode of operation. Finally, we provide a comparative study on these various protocols.
Sgora, Aggeliki; Vergados, Dimitris D.; Chatzimisios, Periklis
A promising solution for wireless environments is the wireless mesh technology that envisages supplementing wired infrastructure with a wireless backbone for providing Internet connectivity to mobile nodes (MNs) or users in residential areas and offices. The IEEE 802.11 TGs has started to work in developing a mesh standard for local area wireless networks. Although a lot of progress has been made and a few new drafts have been released recently, there exist many issues that demand enhanced or even new solutions to 802.11s mesh networking. This paper aims to overview the latest version of the IEEE 802.11s protocol (Draft 2.02), especially the MAC and routing layers, and to point out the challenges that these networks have to overcome in these layers.
Wang, Jing; Li, Fangfang
In this paper, we address the problem of supporting applications with high bandwidth requirements in Wireless Mesh Networks (WMN) and develop a Markov analytic framework to study the important performance measures experienced by SUs in a cognitive radio (CR) based wireless mesh network. Specifically, we study the blocking and forced termination probabilities and throughput of secondary users under systems with/without spectrum handoff and channel reservation. Based on this framework, a novel dynamic cognitive channel access control algorithm for wireless mesh networks is proposed in order to maintain given quality of service (QoS) requirements. Simulation and analysis results show that our proposed dynamic cognitive channel access control algorithm can maximize the throughput while keeping forced termination and blocking probabilities of SUs' requests under the desired constraints, which providing a solution to improve load balance among multipath in wireless mesh networks.
Bhattacharyya, Debnath; Kim, Tai-hoon; Pal, Subhajit
Recent developments in the area of micro-sensor devices have accelerated advances in the sensor networks field leading to many new protocols specifically designed for wireless sensor networks (WSNs). Wireless sensor networks with hundreds to thousands of sensor nodes can gather information from an unattended location and transmit the gathered data to a particular user, depending on the application. These sensor nodes have some constraints due to their limited energy, storage capacity and computing power. Data are routed from one node to other using different routing protocols. There are a number of routing protocols for wireless sensor networks. In this review article, we discuss the architecture of wireless sensor networks. Further, we categorize the routing protocols according to some key factors and summarize their mode of operation. Finally, we provide a comparative study on these various protocols.
Emerging technologies in Broadband Wireless Access (BWA) networks and video coding have enabled high-quality wireless video broadcast/multicast services in metropolitan areas. Joint source-channel coded wireless transmission, especially using hierarchical/superposition coded modulation at the channel, is recognized as an effective and scalable approach to increase the system scalability while tackling the multi-user channel diversity problem. The power allocation and modulation selection problem, however, is subject to a high computational complexity due to the nonlinear formulation and huge solution space. This paper introduces a dynamic programming framework with conditioned parsing, which significantly reduces the search space. The optimized result is further verified with experiments using real video content. The proposed approach effectively serves as a generalized and practical optimization framework that can gauge and optimize a scalable wireless video broadcast/multicast based on multi-resolution modulation in any BWA network.
Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun
With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.
Full Text Available A wireless network system is a pair (U;B, where B is a family of some base stations and U is a set of their users. To investigate the connectivity of wireless network systems, this paper takes covering approximation spaces as mathematical models of wireless network systems. With the help of covering approximation operators, this paper characterizes the connectivity of covering approximation spaces by their definable subsets. Furthermore, it is obtained that a wireless network system is connected if and only if the relevant covering approximation space has no nonempty definable proper subset. As an application of this result, the connectivity of a teacher-student interactive platform is discussed, which is established in the School of Mathematical Sciences of Soochow University. This application further demonstrates the usefulness of rough set theory in pedagogy and makes it possible to research education by logical methods and mathematical methods.
Khan, Kashif A.; Wang, Qi; Luo, Chunbo; Wang, Xinheng; Grecos, Christos
Mobile cloud computing is receiving world-wide momentum for ubiquitous on-demand cloud services for mobile users provided by Amazon, Google etc. with low capital cost. However, Internet-centric clouds introduce wide area network (WAN) delays that are often intolerable for real-time applications such as video streaming. One promising approach to addressing this challenge is to deploy decentralized mini-cloud facility known as cloudlets to enable localized cloud services. When supported by local wireless connectivity, a wireless cloudlet is expected to offer low cost and high performance cloud services for the users. In this work, we implement a realistic framework that comprises both a popular Internet cloud (Amazon Cloud) and a real-world cloudlet (based on Ubuntu Enterprise Cloud (UEC)) for mobile cloud users in a wireless mesh network. We focus on real-time video streaming over the HTTP standard and implement a typical application. We further perform a comprehensive comparative analysis and empirical evaluation of the application's performance when it is delivered over the Internet cloud and the cloudlet respectively. The study quantifies the influence of the two different cloud networking architectures on supporting real-time video streaming. We also enable movement of the users in the wireless mesh network and investigate the effect of user's mobility on mobile cloud computing over the cloudlet and Amazon cloud respectively. Our experimental results demonstrate the advantages of the cloudlet paradigm over its Internet cloud counterpart in supporting the quality of service of real-time applications.
Network densification has always been an important factor to cope with the ever increasing capacity demand. Deploying more base stations (BSs) improves the spatial frequency utilization, which increases the network capacity. However, such improvement comes at the expense of shrinking the BSs\\' footprints, which increases the handover (HO) rate and may diminish the foreseen capacity gains. In this paper, we propose a cooperative HO management scheme to mitigate the HO effect on throughput gains achieved via cellular network densification. The proposed HO scheme relies on skipping HO to the nearest BS at some instances along the user\\'s trajectory while enabling cooperative BS service during HO execution at other instances. To this end, we develop a mathematical model, via stochastic geometry, to quantify the performance of the proposed HO scheme in terms of coverage probability and user throughput. The results show that the proposed cooperative HO scheme outperforms the always best connected based association at high mobility. Also, the value of BS cooperation along with handover skipping is quantified with respect to the HO skipping only that has recently appeared in the literature. Particularly, the proposed cooperative HO scheme shows throughput gains of 12% to 27% and 17% on average, when compared to the always best connected and HO skipping only schemes at user velocity ranging from 80 km/h to 160 Km/h, respectively.
Muhammad Ahsan Latif
Full Text Available The paper presents an analytical study on a wireless traffic dataset carried out under the different approaches of machine learning including the backpropagation feedforward neural network, the time-series NARX network, the self-organizing map and the principal component analyses. These approaches are well-known for their usefulness in the modeling and in transforming a high dimensional data into a more convenient form to make the understanding and the analysis of the trends, the patterns within the data easy. We witness to an exponential rise in the volume of the wireless traffic data in the recent decade and it is increasingly becoming a problem for the service providers to ensure the QoS for the end-users given the limited resources as the demand for a larger bandwidth almost always exist. The inception of the next generation wireless networks (3G/4G somehow provide such services to meet the amplified capacity, higher data rates, seamless mobile connectivity as well as the dynamic ability of reconfiguration and the self-organization. Nevertheless, having an intelligent base-station able to perceive the demand well before the actual need may assist in the management of the traffic data. The outcome of the analysis conducted in this paper may be considered in designing an efficient and an intelligent base-station for better resource management for wireless network traffic.
Chen, Mingzhe; Saad, Walid; Yin, Changchuan
In this paper, the problem of resource management is studied for a network of wireless virtual reality (VR) users communicating using an unmanned aerial vehicle (UAV)-enabled LTE-U network. In the studied model, the UAVs act as VR control centers that collect tracking information from the VR users over the wireless uplink and, then, send the constructed VR images to the VR users over an LTE-U downlink. Therefore, resource allocation in such a UAV-enabled LTE-U network must jointly consider th...
Hansen, Morten Tranberg; Kusy, Branislav
Design and development of wireless sensor network applications adds an additional layer of complexity to traditional computer systems. The developer needs to be an expert in resource constrained embedded devices as well as traditional desktop computers. We propose Tinylnventor, an open......-source development environment that takes a holistic approach to implementing sensor network applications. Users build applications using a drag-and-drop visual programming language Open Blocks, a language that Google selected for its App Inventor for Android. Tinylnventor uses cross-platform programming concepts......, such as threads and common network operations, to provide a unified environment from which it generates application binaries for the respective platforms. We demonstrate through an application example that Tinylnventor is both simple to use and powerful in expressing complex applications....
This paper discusses resent attempts to employ multi-agent technologies for user modelling purposes. Based on the analysis of recent implemented systems, this contribution provides a general agent definition representing a flexible implementation to employ highly specialized entities for user modelling tasks, and illustrates communication and cooperation approaches. In the overall solution, agent teams cooperate to fulfill the requirements of user modelling in a more appropriate way.
Shahid, Bilal; Kannan, Anushiya A; Lovell, Nigel H; Redmond, Stephen J
Indoor localization and asset tracking is an area of research which is finding increasing application in monitoring the wellbeing of elderly subjects in hospital or residential care environments. Radio frequency (RF) based localization methods tend to show poor performance in indoor environments, due to multipath scatter, and simple room-level misassociations, resulting from the relative transparency of some walls to RF waves. Ultrasound (US) localization has shown excellent room-level accuracy, and as US will not easily penetrate walls, room-level misassociations do not often occur. For normal asset tracking systems, the association between an asset and a room is not of critical importance; for clinical applications, which make inferences based on a patient and carer occupying the same room, this association is paramount. This paper outlines a proof of concept for an US-based indoor localization system with sub-room-level accuracy. The proposed design uses a US-based technique, with transmitter beacons placed throughout the environment. The subject wears the receiver module and is free to move throughout the environment. Transmission collisions are alleviated by assigning a unique prime transmission interval to each beacon; meaning the beacons do not require synchronization or coordination and operate independently of one another. Preliminary results show accurate detection at a range of over 5 m at a 0° angle and at approximately 3.5 m at an angle of 30°. Testing of two collocated transmitters, transmitting in the same plane and separated by 2.5 m results in accurate reception of both signals, even within the region of overlap.
Ezenezi, Robins E.
Studies have shown that with the increasing diffusion of cell phones in Nigeria have come with problems such as network congestion, service inefficiencies, rising costs, and increased taxes. The purpose of this study was to examine and explore which, if any, sociopersonal variables (theft of handsets, educational levels, security risk) and…
Bellavista, Paolo; Giannelli, Carlo; Lanzone, Stefano; Riberto, Giulio; Stefanelli, Cesare; Tortonesi, Mauro
The spread of off-the-shelf mobile devices equipped with multiple wireless interfaces together with sophisticated sensors is paving the way to novel wireless Internet of Things (IoT) environments, characterized by multi-hop infrastructure-less wireless networks where devices carried by users act as sensors/actuators as well as network nodes. In particular, the paper presents Real Ad-hoc Multi-hop Peer-to peer-Wireless IoT Application (RAMP-WIA), a novel solution that facilitates the development, deployment, and management of applications in sparse Smart City environments, characterized by users willing to collaborate by allowing new applications to be deployed on their smartphones to remotely monitor and control fixed/mobile devices. RAMP-WIA allows users to dynamically configure single-hop wireless links, to manage opportunistically multi-hop packet dispatching considering that the network topology (together with the availability of sensors and actuators) may abruptly change, to actuate reliably sensor nodes specifically considering that only part of them could be actually reachable in a timely manner, and to upgrade dynamically the nodes through over-the-air distribution of new software components. The paper also reports the performance of RAMP-WIA on simple but realistic cases of small-scale deployment scenarios with off-the-shelf Android smartphones and Raspberry Pi devices; these results show not only the feasibility and soundness of the proposed approach, but also the efficiency of the middleware implemented when deployed on real testbeds.
Stutzman, Warren; Habayeb, Rick
Quarterly progress report No. I on AWINN hardware and software configurations of smart, wideband, multi-function antennas, secure configurable platform, close-in command and control for Sea Basing visualization of wireless...
Woodard, Stanley E. (Inventor); Taylor, Bryant Douglas (Inventor)
A wireless damage location sensing system uses a geometric-patterned wireless sensor that resonates in the presence of a time-varying magnetic field to generate a harmonic response that will experience a change when the sensor experiences a change in its geometric pattern. The sensing system also includes a magnetic field response recorder for wirelessly transmitting the time-varying magnetic field and for wirelessly detecting the harmonic response. The sensing system compares the actual harmonic response to a plurality of predetermined harmonic responses. Each predetermined harmonic response is associated with a severing of the sensor at a corresponding known location thereof so that a match between the actual harmonic response and one of the predetermined harmonic responses defines the known location of the severing that is associated therewith.
Explores real-world wireless sensor network development, deployment, and applications. The book begins with an introduction to wireless sensor networks and their fundamental concepts. Hardware components, operating systems, protocols, and algorithms that make up the anatomy of a sensor node are described in chapter two. Properties of wireless communications, medium access protocols, wireless links, and link estimation protocols are described in chapter three and chapter four. Routing basics and metrics, clustering techniques, time synchronization and localization protocols, as well as sensing techniques are introduced in chapter five to nine. The concluding chapter summarizes the learnt methods and shows how to use them to deploy real-world sensor networks in a structured way.
Majidzadeh Bafar, Vahid
Wireless Cortical Implantable Systems examines the design for data acquisition and transmission in cortical implants. The first part of the book covers existing system-level cortical implants, as well as future devices. The authors discuss the major constraints in terms of microelectronic integration. The second part of the book focuses on system-level as well as circuit and system level solutions to the development of ultra low-power and low-noise microelectronics for cortical implants. Existing solutions are presented and novel methods and solutions proposed. The third part of the book focuses on the usage of digital impulse radio ultra wide-band transmission as an efficient method to transmit cortically neural recorded data at high data-rate to the outside world. Original architectural and circuit and system solutions are discussed.
Full Text Available We study the energy-efficient configuration of multihop paths with automatic repeat request (ARQ mechanism in wireless ad hoc networks. We adopt a cross-layer design approach and take both the quality of each radio hop and the battery capacity of each transmitting node into consideration. Under certain constraints on the maximum tolerable transmission delay and the required packet delivery ratio, we solve optimization problems to jointly schedule the transmitting power of each transmitting node and the retransmission limit over each hop. Numerical results demonstrate that the path configuration methods can either significantly reduce the average energy consumption per packet delivery or considerably extend the average lifetime of the multihop route.
Narla, A.; Sliwa, K. M.; Hatridge, M.; Shankar, S.; Frunzio, L.; Schoelkopf, R. J.; Devoret, M. H.
Josephson junction parametric amplifiers are playing a crucial role in the readout chain in superconducting quantum information experiments. However, their integration with current 3D cavity implementations poses the problem of transitioning between waveguide, coax cables, and planar circuits. Moreover, Josephson amplifiers require auxiliary microwave components, like directional couplers and/or hybrids, that are sources of spurious losses and impedance mismatches that limit measurement efficiency and amplifier tunability. We have developed a wireless architecture for these parametric amplifiers that eliminates superfluous microwave components and interconnects. This greatly simplifies their assembly and integration into experiments. We present an experimental realization of such a device operating in the 9–11 GHz band with about 100 MHz of amplitude gain-bandwidth product, on par with devices mounted in conventional sample holders. The simpler impedance environment presented to the amplifier also results in increased amplifier tunability.
Capkun, Srdjan; Hubaux, Jean-Pierre
So far, the problem of positioning in wireless networks has been studied mainly in a non-adversarial settings. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call...... Verifiable Multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations....
solutions exist which can be tailored to meet the needs nearly any wireless application. Some notable current solutions include USRPs  and GNURadio ...tailored to meet the needs nearly any wireless application. Some notable current solutions include USRPs  and GNURadio . For this effort, the WARPv3...en.wikipedia.org/wiki/List of software-defined radios  “Ettus research.” [Online]. Available: http://www.ettus.com  “ Gnuradio .” [Online]. Available: http
Zvi H. Meiksin
Two industrial prototype units for through-the-earth wireless communication were constructed and tested. Preparation for a temporary installation in NIOSH's Lake Lynn mine for the through-the-earth and the in-mine system were completed. Progress was made in the programming of the in-mine system to provide data communication. Work has begun to implement a wireless interface between equipment controllers and our in-mine system.
Zvi H. Meiksin
Two industrial prototype units for through-the-earth wireless communication were constructed and tested. Preparation for a temporary installation in NIOSH's Lake Lynn mine for the through-the-earth and the in-mine system were completed. Progress was made in the programming of the in-mine system to provide data communication. Work has begun to implement a wireless interface between equipment controllers and our in-mine system
is proposed for adaptively switching the SC transmission frequency based on the location of small cell users and interference to macrocell users. We propose a resource allocation approach which maximizes the sum rate of small cell users while minimizing interference to macrocell users and the total power......In this paper, we investigate downlink resource allocation in two-tier OFDMA heterogeneous networks comprising a macrocell transmitting at a microwave frequency and dual band small cells utilizing both microwave and millimeter wave frequencies. A non - cooperative game theoretic approach...... consumption. The performance of the proposed resource allocation solution is evaluated via rigorous MATLAB simulations...
Frattasi, S.; Fathi, Hanane; Fitzek, Frank H. P.
The exponential growth of user demands and the limitations of Third Generation of Mobile Communication Systems (3G) have brought researchers to start reflecting on the Fourth Generation (4G). Many prophetic visions have appeared in literature presenting the future generation as the ultimate...... boundary of the wireless mobile communication without any limit in its potential, but practically not giving any designing rules and thus any definition of it. In this paper we hence propose a new framework the user centric system that, through a satellite hierarchical vision, presents the key features...
Keebler, P. F.; Phipps, K. O.
The use of wireless technologies in commercial and industrial facilities has grown significantly in the past several years. New applications of wireless technologies with increasing frequency and varying radiated power are being developed everyday. Wireless application specialists and end users have already identified several sources of electromagnetic interference (EMI) in these facilities. Interference has been reported between wireless devices and between these devices and other types of electronic equipment either using frequencies in the unlicensed wireless spectrum or equipment that may generate undesired man-made noise in this spectrum. Facilities that are not using the wireless band should verify the spectral quality of that band and the electromagnetic compatibility (EMC) integrity of safety-related power and signal cables before installing wireless technologies. With the introduction of new wireless devices in the same electromagnetic space where analog and digital I and C systems and cables must co-exist, the ability of facility managers to manage their spectra will dictate the degree of interference between wireless devices and other electronic equipment. Because of the unknowns associated with interference with analog and digital I and C systems in the wireless band, nuclear power plants have been slow to introduce wireless technologies in plant areas. With the application of newly developed advanced radiated emissions measurement systems that can record, process, and analyze radiated and conducted emissions in a cost-effective manner, facility managers can more reliably characterize potential locations for wireless technologies, including potential coupling effects with safety-related power and signal cables, with increased confidence that the risks associated with creating an interference can be significantly reduced. This paper will present an effective philosophy already being used in other mission-critical applications for managing EMC, an
D. David Neels Pon Kumar
Full Text Available During the last few years, users all over the world have become more and more familiar to the availability of broadband access. When users want broadband Internet service, they are generally restricted to a DSL (Digital Subscribers Line, or cable-modem-based connection. Proponents are advocating worldwide interoperability for microwave access (WiMAX, a technology based on an evolving standard for point-to multipoint wireless networking. Scheduling algorithms that support Quality of Service (QoS differentiation and guarantees for wireless data networks are crucial to the deployment of broadband wireless networks. The performance affecting parameters like fairness, bandwidth allocation, throughput, latency are studied and found out that none of the conventional algorithms perform effectively for both fairness and bandwidth allocation simultaneously. Hence it is absolutely essential for an efficient scheduling algorithm with a better trade off for these two parameters. So we are proposing a novel Scheduling Algorithm using Fuzzy logic and Artificial neural networks that addresses these aspects simultaneously. The initial results show that a fair amount of fairness is attained while keeping the priority intact. Results also show that maximum channel utilization is achieved with a negligible increment in processing time.
Abstract Voice quality on VoIP communication is caused by many factors, one of which is the quality of the server. Choosing PC platform or server which is suitable is the main issue in developing VoIP network. A bad server performance or not equivalent with the most of users will degrade the sound quality or even not able to connect between users. Tthe test carried out to the performance of the wireless access point Linksys WRT54GL which is used as a VoIP server. The test was carried out to determine how many VoIP calls which are able to be serviced by a wireless access point as a VoIP server and how long the server needs to be able to process every signal of SIP and RTP packet. Based on the test result performed, the VoIP server on the wireless access point is able to serve VoIP communication well for a few calls number, so it is worth to be implemented on the use of small scale. The use of Native Bridging method in handling the media performed by the server can increase the number of calls that were able to be served about 3 to 7 times compared with other methods. Keywords— VoIP, Asterisk, Acess Point, WRT54GL, OpenWRT, Performance
Li, Meiyi; Cao, Shengling
Wireless Mesh Network is a type of wireless networks in which demands of bandwidth for users has mobility. The backbone node placement of wireless mesh networks in a dynamic scenario is investigated, and the TSDPSO algorithm is used to adapt the dynamic environment, which updates node deployment location to adapt to changes in demand if it detects environmental changes at the beginning of the cycle time. In order to meet the demands of bandwidth for users and network connectivity, particle swarm optimization algorithm is employed to select the gateway location, then nodes to the backbone network is added constantly until all requirement is covered. The experimental results show that algorithm could get effective solution in dynamic environment.
Full Text Available This paper proposes a location authentication method to prevent wormhole payment attack in Samsung Pay. The primary feature of this method is comparing wireless Access Point (AP information collected by the current Samsung Pay user and a wireless AP model (WM that was created from wireless AP information (WI sent by previous Samsung Pay users. To create the WM, an autoencoder is used. Unlike the existing location authentication techniques that use WI, our method does not require additional hardware, modification of the Point of Sale (POS software, or any pre-requisite information such as the location coordinates of the POS. We show that the proposed location authentication technique exhibits the minimum Equal Error Rate (EER of 2.4% in real payment environments.
Full Text Available This paper presents the Wi-Fi phone with RFID (Radio frequency identification of student entered the school, via Wireless Access Points (APs of school will transmit MAC address with RFID of Wi-Fi phone to Internet Data Center (IDC for server and then the message exchanged by using GSM (or 3G has been transmitted message (or mail to the mobile user of parents (or client user. The wireless access points support broadcasting multiple SSIDs, each of which can have a different set of security and network setting. The RADIUS server is used to authenticate the Wireless Access Point (AP and mobile nodes. In safety case system, we used the several authentication and encryption options for the WLAN. We will discuss the use of Wi-Fi protected Access (WPA, RFID, IP Security (IPSec, and Secure Socket Layer (SSL, and there are high Quality of service (QoS and performance.
Li, Shancang; Xu, Lida; Wang, Xinheng; Wang, Jue
This article presents a hybrid wireless network integration scheme in cloud services-based enterprise information systems (EISs). With the emerging hybrid wireless networks and cloud computing technologies, it is necessary to develop a scheme that can seamlessly integrate these new technologies into existing EISs. By combining the hybrid wireless networks and computing in EIS, a new framework is proposed, which includes frontend layer, middle layer and backend layers connected to IP EISs. Based on a collaborative architecture, cloud services management framework and process diagram are presented. As a key feature, the proposed approach integrates access control functionalities within the hybrid framework that provide users with filtered views on available cloud services based on cloud service access requirements and user security credentials. In future work, we will implement the proposed framework over SwanMesh platform by integrating the UPnP standard into an enterprise information system.
Schaars, Marvin A.
A teaching aid and information source on activities, principles, and practices of cooperatives is presented. The following topics are included: (1) Basic Interests of People, (2) Legal Organization of Business in the United States, (3) What Is a Cooperative? (4) Procedure for Organizing Cooperatives, (5) How Cooperatives Are Run and Managed, (6)…
T. N. Nguyen
Full Text Available This paper studies the outage performance and system throughput of a bidirectional wireless information and power transfer system with a helping relay. The relay helps forward wireless power from the access point (AP to the user, and also the information from the user to the AP in the reverse direction. We assume that the relay uses time switching based energy harvesting protocol. The analytical results provide theoretical insights into the effect of various system parameters, such as time switching factor, source transmission rate, transmitting-power-to-noise ratio to system performance for both amplify-and-forward and decode-and-forward relaying protocols. The optimal time switching ratio is determined in each case to maximize the information throughput from the user to the AP subject to the energy harvesting and consumption balance constraints at both the relay and the user. All of the above analyses are confirmed by Monte-Carlo simulation.
In this thesis, we consider the efficient distribution of live and scheduled multimedia content (e.g., radio and TV broadcasts) to mobile users via a ubiquitous wireless Internet. The objective is to design and develop a content delivery system that (1) enables content owners to deliver their
can identify and then work with one another. Changes to parameters that would seem to make cooperation more attractive, such as an increase in the discount factor or the fraction of conditional cooperators, can reduce equilibrium cooperation if they decrease a selfish player's incentive to sort.......This paper looks at cooperation in teams where some people are selfish and others are conditional cooperators, and where lay-offs will occur at a fixed future date. I show that the best way to sustain cooperation prior to the lay-offs is often in a sorting equilibrium, where conditional cooperators...
Martyn N.J. Paley
Full Text Available MRI-guidance is increasingly used for minimally-invasive procedures, such as biopsy, and requires real-time active tracking of surgical instruments. Although optical and MR-based fiducial tracking devices have been used, these systems rely on complex contact with the operator or line-of-sight access for effective operation. A more straight-forward and clinically robust method is required to allow interactive real-time slice positioning of MR scan planes during interventional procedures. This study evaluated the use of a wristwatch-mounted, low cost wireless interface device for real-time MRI guidance. The device was designed to interact with software for planning rather than instrument guidance. The wireless device was integrated with two novel, open interventional magnet systems operating at 0.17T and 0.5T and utilized a novel customized graphic user interface (GUI to assess interventional capability.
Full Text Available Multiradio wireless mesh network (WMN is a feasible choice for several applications, as routers with multiple network interface cards have become cheaper. Routing in any network has a great impact on the overall network performance, thus a routing protocol or algorithm for WMN should be carefully designed taking into account the specific characteristics of the network. In addition, in wireless networks, serious unfairness can occur between users if the issue is not addressed in the network protocols or algorithms. In this paper, we are proposing a novel centralized routing algorithm, called Subscriber Aware Fair Routing in WMN (SAFARI, for multiradio WMN that assures fairness, leads to a feasible scheduling, and does not collapse the aggregate network throughput with a strict fairness criterion. We show that our protocol is feasible and practical, and exhaustive simulations show that the performance is improved compared to traditional routing algorithms.
Wagh, Sanjeev; Prasad, Ramjee
the cluster head intelligently using auction data of node i.e. its local battery power, topology strength and external battery support. The network lifetime is the centre focus of the research paper which explores intelligently selection of cluster head using auction based approach. The multi......The wireless sensor networks are designed to install the smart network applications or network for emergency solutions, where human interaction is not possible. The nodes in wireless sensor networks have to self organize as per the users requirements through monitoring environments. As the sensor...... nodes are deployed in an inaccessible location for particular mission, it is difficult to exchange or recharge the nodes battery. Hence the important issues to design the sensor network for maximum time duration of network and also for low power operation of the nodes. The proposal is to select...
Full Text Available A cognitive radio-based spectrum allocation scheme using an active cooperative-aware mechanism is proposed in this paper. The scheme ensures that the primary user and secondary users cooperate actively for their own benefits. The primary user releases some spectrum resources to secondary users to actively stimulate them to actively join the cooperative transmission of the primary user, and secondary users help the primary user to relay data in return, as well as its self-data transmission at the same time. The Stackelberg game is used to evenly and jointly optimize the utilities of both the primary and secondary users. Simulation results show that the proposed active cooperation-aware mechanism could improve the body sensor network performance.
Jiang, Fu; Guo, Ying; Peng, Jun; Hu, Jiankun
A cognitive radio-based spectrum allocation scheme using an active cooperative-aware mechanism is proposed in this paper. The scheme ensures that the primary user and secondary users cooperate actively for their own benefits. The primary user releases some spectrum resources to secondary users to actively stimulate them to actively join the cooperative transmission of the primary user, and secondary users help the primary user to relay data in return, as well as its self-data transmission at the same time. The Stackelberg game is used to evenly and jointly optimize the utilities of both the primary and secondary users. Simulation results show that the proposed active cooperation-aware mechanism could improve the body sensor network performance.
Masoum, Alireza; Meratnia, Nirvana; Dilo, Arta; Taghikhaki, Zahra; Havinga, Paul J.M.
Providing reliable and timely information is one of the important tasks of wireless sensor networks. To this end, recently quality of service (QoS) satisfying end users and matching WSN constrains, has become an important research topic. However, majority of research in this area has overlooked the
Koonen, A.M.J.; Popov, M.; Wessing, Henrik
Bringing radio access points closer to the end-users improves radio energy efficiency. However, taking into account both the radio and the optical parts of a fibre-wireless access system, the overall system energy efficiency has an upper bound determined by the relation between the energy...
.... Wireless sensor networks pose unique challenges and limitations to the traditional schemes, which are used in the other wireless networks for security protection, and are due mainly to the increased...
Here is a comprehensive examination of CMOS circuits for passive wireless microsystems. Covers design challenges, fundamental issues of ultra-low power wireless communications, radio-frequency power harvesting, and advanced design techniques, and more.
National Aeronautics and Space Administration — Mobitrum Corporation has demonstrated the feasibility in the Phase I of " A Wireless Sensor Portal Technology" and proposes a Phase II effort to develop a wireless...
If you are a security professional, pentester, or anyone interested in getting to grips with wireless penetration testing, this is the book for you. Some familiarity with Kali Linux and wireless concepts is beneficial.
Nichols, Kelvin F.; Best, Susan; Schneider, Larry
With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their off ices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (LAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing
The wide scale deployment of wireless body area networks (WBANs) hinges on designing energy efficient communication protocols to support the reliable communication as well as to prolong the network lifetime. Cooperative communications, a relatively new idea in wireless communications, offers the benefits of multi-antenna systems, thereby improving the link reliability and boosting energy efficiency. In this short paper, the advantages of resorting to cooperative communications for WBANs in terms of minimized energy consumption are investigated. Adopting an energy model that encompasses energy consumptions in the transmitter and receiver circuits, and transmitting energy per bit, it is seen that cooperative transmission can improve energy efficiency of the wireless network. In particular, the problem of optimal power allocation is studied with the constraint of targeted outage probability. Two strategies of power allocation are considered: power allocation with and without posture state information. Using analysis and simulation-based results, two key points are demonstrated: (i) allocating power to the on-body sensors making use of the posture information can reduce the total energy consumption of the WBAN; and (ii) when the channel condition is good, it is better to recruit less relays for cooperation to enhance energy efficiency.
In this thesis, we study cooperative interval games, a generalized model of cooperative games in which worth of every coalition corresponds with a closed interval representing all possible outcomes of their cooperation. We give a brief introduction into classical cooperative games, interval analysis and finally introduction to cooperative interval games with focus on selections, that is on all possible outcomes of interval game with no additional uncertainty. We introduce new selection-based ...
Baştuğ, Ejder; Bennis, Mehdi; Debbah, Mérouane
International audience; This article explores one of the key enablers of beyond 4G wireless networks leveraging small cell network deployments, namely proactive caching. Endowed with predictive capabilities and harnessing recent developments in storage, context-awareness and social networks, peak traffic demands can be substantially reduced by proactively serving predictable user demands, via caching at base stations and users' devices. In order to show the effectiveness of proactive caching,...
Full Text Available Cooperative relay can effectively improve spectrum efficiency by exploiting the spatial diversity in the wireless networks. However, wireless nodes may acquire different network information with various users’ location and mobility, channels’ conditions, and other factors, which results in asymmetric information between the source and the relay nodes (RNs. In this paper, the relay incentive mechanism between relay nodes and the source is investigated under the asymmetric information. By modelling multiuser cooperative relay as a labour market, a contract model with moral hazard for relay incentive is proposed. To effectively incentivize the potential RNs to participate in cooperative relay, the optimization problems are formulated to maximize the source’s utility while meeting the feasible conditions under both symmetric and asymmetric information scenarios. Numerical simulation results demonstrate the effectiveness of the proposed contract design scheme for cooperative relay.
Lewis, Frank L; Hengster-Movric, Kristian; Das, Abhijit
Task complexity, communication constraints, flexibility and energy-saving concerns are all factors that may require a group of autonomous agents to work together in a cooperative manner. Applications involving such complications include mobile robots, wireless sensor networks, unmanned aerial vehicles (UAVs), spacecraft, and so on. In such networked multi-agent scenarios, the restrictions imposed by the communication graph topology can pose severe problems in the design of cooperative feedback control systems. Cooperative control of multi-agent systems is a challenging topic for both control theorists and practitioners and has been the subject of significant recent research. Cooperative Control of Multi-Agent Systems extends optimal control and adaptive control design methods to multi-agent systems on communication graphs. It develops Riccati design techniques for general linear dynamics for cooperative state feedback design, cooperative observer design, and cooperative dynamic output feedback design. B...
In the modern world, we have often heard a word- wireless charging technology. Actually what is it all about? So this paper is giving you the whole package about wireless charging technology. Wireless charging is a technology through which power is transmitted through an air gap to the electrical devices for the motive of replenishment of energy. At present wireless charging techniques and development of commercial products have provided a promise to address the energy bottleneck of portable ...
H. Gorine; M. Ramadan Elmezughi
In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issue...
Hiraguri, Takefumi; Ichikawa, Takeo; Iizuka, Masataka; Kubota, Shuji
This paper proposes two traffic control schemes to support the communication quality of multimedia streaming services such as VoIP and audio/video over IEEE 802.11 wireless LAN systems. The main features of the proposed scheme are bandwidth control for each flow of the multimedia streaming service and load balancing between access points (APs) of the wireless LAN by using information of data link, network and transport layers. The proposed schemes are implemented on a Linux machine which is called the wireless traffic controller (WTC). The WTC connects a high capacity backbone network and an access network to which the APs are attached. We evaluated the performance of the proposed WTC and confirmed that the communication quality of the multimedia streaming would be greatly improved by using this technique.
Beuscart, R J; Molenda, S; Souf, N; Foucher, C; Beuscart-Zephir, M C
Groupware and new Information Technologies have now made it possible for people in different places to work together in synchronous cooperation. Very often, designers of this new type of software are not provided with a model of the common workspace, which is prejudicial to software development and its acceptance by potential users. The authors take the example of a task of medical co-diagnosis, using a multi-media communication workstation. Synchronous cooperative work is made possible by using local ETHERNET or public ISDN Networks. A detailed ergonomic task analysis studies the cognitive functioning of the physicians involved, compares their behaviour in the normal and the mediatized situations, and leads to an interpretation of the likely causes for success or failure of CSCW tools.
Switching techniques have been first proposed as a spacial diversity techniques. These techniques have been shown to reduce considerably the processing load while letting multi-antenna systems achieve a specific target performance. In this thesis, we take a different look at the switching schemes by implementing them for different other wireless applications. More specifically, this thesis consists of three main parts, where the first part considers a multiuser environment and an adaptive scheduling algorithm based on the switching with post-selection scheme for statistically independent but non-identically distributed channel conditions. The performance of this switched based scheduler is investigated and a multitude of performance metrics are presented. In a second part, we propose and analyze the performance of three switched-based algorithms for interference reduction in the downlink of over-loaded femtocells. For instance, performance metrics are derived in closed-form and these metrics are used to compare these three proposed schemes. Finally in a third part, a switch based opportunistic channel access scheme is proposed for a cognitive radio system and its performance is analyzed in terms of two new proposed metrics namely the average cognitive radio access and the waiting time duration.
Full Text Available No abstract available. Article truncated at 150 words. Case Presentation History of Present Illness A 67 year-old man presents 10 days after swallowing a capsule endoscopy camera that was never retrieved. The wireless capsule was swallowed asymptomatically for evaluation of heme positive stools after negative upper and lower endoscopies. Patient noted that the evening after swallowing the camera he developed mild shortness of breath and cough. The cough and shortness of breath were persistent and worsened while lying down and when moving positions. He denied prior issues with swallowing or aspiration. Review of Systems Negative other than what is noted above. PMH, SH, and FH Past medical history: coronary artery disease, peripheral vascular disease, hyperlipidemia Surgical history: femoral-popliteal bypass, previous shoulder and back surgery Social history: 1 pack/day of cigarettes for 50 years, prior alcohol usage but not current, no illicit drugs Family history: no pulmonary diseases Physical Exam Vital signs: temperature 36.7º C, heart rate 86 beats per minute ...
Varnavas, Kosta; Richeson, Jeff
NASA field center Marshall Space Flight Center (Huntsville, AL), has invested in advanced wireless sensor technology development. Developments for a wireless microcontroller back-end were primarily focused on the commercial Synapse Wireless family of devices. These devices have many useful features for NASA applications, good characteristics and the ability to be programmed Over-The-Air (OTA). The effort has focused on two widely used sensor types, mechanical strain gauges and thermal sensors. Mechanical strain gauges are used extensively in NASA structural testing and even on vehicle instrumentation systems. Additionally, thermal monitoring with many types of sensors is extensively used. These thermal sensors include thermocouples of all types, resistive temperature devices (RTDs), diodes and other thermal sensor types. The wireless thermal board will accommodate all of these types of sensor inputs to an analog front end. The analog front end on each of the sensors interfaces to the Synapse wireless microcontroller, based on the Atmel Atmega128 device. Once the analog sensor output data is digitized by the onboard analog to digital converter (A/D), the data is available for analysis, computation or transmission. Various hardware features allow custom embedded software to manage battery power to enhance battery life. This technology development fits nicely into using numerous additional sensor front ends, including some of the low-cost printed circuit board capacitive moisture content sensors currently being developed at Auburn University.
categorized into two types: fixed and mobile wireless. The broadband fixed wireless network technologies .... 3.0 WIRELESS FIDELITYF (Wi-Fi). NETWORK IMPLEMENTATION. A Wi-Fi enabled device such as a PC, game .... Amateur radio, video senders, and cordless phones, can cause significant additional interference.
Remke, Anne Katharina Ingrid; Wu, Xian
In process industries wired supervisory and control networks are more and more replaced by wireless systems. Wireless communication inevitably introduces time delays and message losses, which may degrade the system reliability and performance. WirelessHART, as the first international standard for
Zhao, Nan; Wu, Minghu; Xiong, Wei; Liu, Cong
By exploiting the spatial diversity of multiple wireless nodes, cooperative communication technique is a promising technique for spectrum sharing to improve spectrum efficiency. In this paper, the incentive issue between relay nodes’ (RNs’) service and source’s relay selection is investigated in the presence of the asymmetric information scenario. Multiuser cooperative communication is modelled as a labour market, where the source designs a contract and each relay node decides to select a con...
Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee
information source selection and management framework and presents an algorithm which selects the information source based on the information mismatch probability . The sampling rate for every access is decided as per the maximum allowable power consumption limit. Index Terms-wireless sensor network...... applications. Different properties and characteristics like sensitivity, response time etc., of these different sensors will result in generating information at difl'erent rates. When these different types of sensors are deployed to collect same information, the users have choice to select from different...... information sources based on their preferences and requirement. In addition, the user can also switch from one information source to another when the current information source either becomes unavailable or the users requirement changes. In this paper, based on above argument, we develop a reliable...
Full Text Available Dual-mode wireless video transmission has two major problems. Firstly, one is time delay difference bringing about asynchronous reception decoding frame error phenomenon; secondly, dual-mode network bandwidth inconformity causes scheduling problem. In order to solve above two problems, a kind of TD-SCDMA/CDMA20001x dual-mode wireless video transmission design method is proposed. For the solution of decoding frame error phenomenon, the design puts forward adding frame identification and packet preprocessing at the sending and synchronizing combination at the receiving end. For the solution of scheduling problem, the wireless communication channel cooperative work and video data transmission scheduling management algorithm is proposed in the design.
Full Text Available Abstrak Perkembangan teknologi komunikasi Wireless mengarah ke teknologi yang berbasis jaringan IP (Internet Protocol. Access Point adalah suatu perangkat Wireless Router. Access point membentuk hot spot, sedangkan Wireless Router mengatur lalu lintas data. Parameter yang diukur pada penelitian ini yaitu Quality of Service (QoS, antara lain pengukuran jitter, delay, dan packet loss yang dihasilkan dalam layanan paket data. Nilai jitter rata-rata sesama pengguna modem ADSL yang terhubung dengan access point pada smartphone bernilai 143.36 ms sedangkan pada laptop berada pada nilai 45.6 ms. Nilai jitter sesama penguna modem GPON, nilai rata-rata pada smartphone bernilai 133.12 ms, sedangkan pada laptop berada pada nilai 45.56 ms. Nilai rata-rata delay sesama pengguna modem ADSL pada smartphone bernilai 99.04 ms, sedangkan pada laptop sebesar 56.33 ms. Nilai rata-rata delay pada sesama pengguna modem GPON pada smartphone adalah 97.96 ms sedangkan pada laptop sebesar 56.15 ms. Packet loss dari hasil pengujian keduanya memiliki presentase sama yaitu 1%. Kata kunci: Teknologi Digital Subscriber Line, Jaringan Optik Pasif, Dynamic Host Configuration Protocol (DHCP, Quality of Service (QoS Abstract Wireless communication technology development leading to technologies that network-based IP (Internet Protocol. Access Point Wireless Router is a device. Access point forming a hot spot, while the router manage data traffic. Parameters measured in this research is Quality of Service (QoS. among other things, measuring jitter, delay, and packet loss. resulting in packet data service. Jitter value among ADSL fellow have the average on smartphones 143.36 ms. On laptop average be at 45.6 ms. While jitter value among GPON fellow user have the average on smartphone 133.12 ms. On laptop average be at 45.56 ms. The average value of the delay to ADSL fellow users on smartphones 99.04 ms and on laptop average be at 56.33 ms. While delay value among GPON fellow user
Mehta, Rajvi; Nankivil, Derek; Zielinski, David J; Waterman, Gar; Keller, Brenton; Limkakeng, Alexander T; Kopper, Regis; Izatt, Joseph A; Kuo, Anthony N
McCown, Steven H; Derr, Kurt W; Rohde, Kenneth W
Wireless device monitoring systems and monitoring devices include a communications module for receiving wireless communications of a wireless device. Processing circuitry is coupled with the communications module and configured to process the wireless communications to determine whether the wireless device is authorized or unauthorized to be present at the monitored area based on identification information of the wireless device. Methods of monitoring for the presence and identity of wireless devices are also provided.
Nowadays, wireless networks are used in most of the applications with radio technologies being used in all kinds of wireless networks. In all wireless links, the transmitted packets can be lost. How to identify the quality of a certain wireless link and achieve the best delivery performance over a certain wireless network is an open issue. In this thesis, the performance of wireless mesh network, wireless sensor network and cellular network have been investigated by the method of measurements...
The contractor for the supply and distribution of pressurised gases has drawn our attention to the large number of gas bottles and banks being stored on the site for increasingly long periods. Users are reminded that the rental charges for gas bottles and banks are based on a progressive rate depending on their period of use. To assist CERN in its efforts to optimise its operations in this field, you are kindly requested: - to return empty or unused containers to the official gas distribution points as soon as possible - to try to limit reserve stocks, bearing in mind that standardised gases can be delivered within 36 hours. This will result in a higher turnover rate and in increased safety and will improve the availability of the gases. For all further enquiries, please contact "Gas store" by e-mail. Thank you for your co-operation. Logistics Group SPL Division
The contractor for the supply and distribution of pressurised gases has drawn our attention to the large number of gas bottles and banks being stored on the site for increasingly long periods. Users are reminded that the rental charges for gas bottles and banks are based on a progressive rate depending on their period of use. To assist CERN in its efforts to optimise its operations in this field, you are kindly requested : to return empty or unused containers to the official gas distribution points as soon as possible, to try to limit reserve stocks, bearing in mind that standardised gases can be delivered within 36 hours. This will result in a higher turnover rate and in increased safety and will improve the availability of the gases. For all further enquiries, please contact Gas.Store@cern.ch by e-mail or call 72265. Thank you for your co-operation.
Orthogonal Frequency Division Multiplexing (OFDM) systems are widely used in the standards for digital audio/video broadcasting, WiFi and WiMax. Being a frequency-domain approach to communications, OFDM has important advantages in dealing with the frequency-selective nature of high data rate wireless communication channels. As the needs for operating with higher data rates become more pressing, OFDM systems have emerged as an effective physical-layer solution.This short monograph is intended as a tutorial which highlights the deleterious aspects of the wireless channel and presents why OFDM is
The wireless medium is a shared resource. If nearby devices transmit at thesame time, their signals interfere, resulting in a collision. In traditionalnetworks, collisions cause the loss of the transmitted information. For thisreason, wireless networks have been designed with the assumption thatinterference is intrinsically harmful and must be avoided.This book, a revised version of the author's award-winning Ph.D.dissertation, takes an alternate approach: Instead of viewing interferenceas an inherently counterproductive phenomenon that should to be avoided, wedesign practical systems that tra
Jensen, Casper Bruun
This paper discusses a research project in which social scientists were involved both as analysts and supporters during a pilot with a new wireless nursing call system. The case thus exemplifies an attempt to participate in developing dependable health care systems and offers insight into the cha......This paper discusses a research project in which social scientists were involved both as analysts and supporters during a pilot with a new wireless nursing call system. The case thus exemplifies an attempt to participate in developing dependable health care systems and offers insight...
Rondeau, Thomas W
This cutting-edge resource offers practical overview of cognitive radio, a paradigm for wireless communications in which a network or a wireless node changes its transmission or reception parameters. The alteration of parameters is based on the active monitoring of several factors in the external and internal radio environment. This book offers a detailed description of cognitive radio and its individual parts. Practitioners learn how the basic processing elements and their capabilities are implemented as modular components. Moreover, the book explains how each component can be developed and t
A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques. The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking. Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the
Nielsen, Jimmy Jessen; Noureddine, Hadi; Amiot, Nicolas
In this paper we present results of real-life local- ization experiments performed in an unprecedented cooperative and heterogeneous wireless context. The experiments covered measurements of different radio devices packed together on a trolley, emulating a multi-standard Mobile Terminal (MT) along...
Craciunescu, Razvan; Mihovska, Albena Dimitrova; Prasad, Ramjee
This paper uses a novel set of functions to model the relay selection process in a scenario of cooperative wireless communications. We define a utility function that reflects the behavior and influence that a selected relay may have on the quality of the link to be established for the forwarding...... of Influence and Behavior to assess the effect on the system performance....
Full Text Available A wireless rechargeable sensor network (WRSN consists of sensor nodes that can harvest energy emitted from wireless chargers for refilling their batteries so that the WRSN can operate sustainably. This paper assumes wireless chargers are equipped with directional antennas, and are deployed on grid points of a fixed height to propose two heuristic algorithms solving the following wireless charger deployment optimization (WCDO problem: how to deploy as few as possible chargers to make the WRSN sustainable. Both algorithms model the charging space of chargers as a cone and calculate charging efficiency according power regression expressions complying with the Friis transmission equation. The two algorithms are the greedy cone covering (GCC algorithm and the adaptive cone covering (ACC algorithm. The GCC (respectively, ACC algorithm greedily (respectively, adaptively generates candidate cones to cover as many as possible sensor nodes. Both algorithms then greedily select the fewest number of candidate cones, each of which corresponds to the deployment of a charger, to have approximate solutions to the WCDO problem. We perform experiments, conduct simulations and do analyses for the algorithms to compare them in terms of the time complexity, the number of chargers deployed, and the execution time.
Describes the Art Technology Group (ATG), an electronic business and customer management company, and the work they have done with wireless technology. Highlights include designing virtual offices and supporting the resulting virtual community; the mobility it allows; problems with bandwidth; and display issues. (LRW)
For cooperative amplify-and-forward (AF) relaying in spectrum-sharing wireless systems, secondary users share spectrum resources originally licensed to primary users to communicate with each other and, thus, the transmit power of secondary transmitters is strictly limited by the tolerable interference powers at primary receivers. Furthermore, the received signals at a relay and at a secondary receiver are inevitably interfered by the signals from primary transmitters. These co-channel interferences (CCIs) from concurrent primary transmission can significantly degrade the performance of secondary transmission. This paper studies the effect of CCIs on outage probability of the secondary link in a spectrum-sharing environment. In particular, in order to compensate the performance loss due to CCIs, the transmit powers of a secondary transmitter and its relaying node are respectively optimized with respect to both the tolerable interference powers at the primary receivers and the CCIs from the primary transmitters. Moreover, when multiple relays are available, the technique of opportunistic relay selection is exploited to further improve system performance with low implementation complexity. By analyzing lower and upper bounds on the outage probability of the secondary system, this study reveals that it is the tolerable interference powers at primary receivers that dominate the system performance, rather than the CCIs from primary transmitters. System designers will benefit from this result in planning and designing next-generation broadband spectrum-sharing systems.
Nikookar, Homayoun; Prasad, Ramjee
Ultra Wideband (UWB) Technology is the cutting edge technology for wireless communications with a wide range of applications. In Introduction to Ultra Wideband for Wireless Communications UWB principles and technologies for wireless communications are explained clearly. Key issues such as UWB...... wireless channels, interference, signal processing as well as applications and standardization activities are addressed. Introduction to Ultra Wideband for Wireless Communications provides easy-to-understand material to (graduate) students and researchers working in the field of commercial UWB wireless...... communications. Due to tutorial nature of the book it can also be adopted as a textbook on the subject in the Telecommunications Engineering curriculum. Problems at the end of each chapter extend the reader's understanding of the subject. Introduction to Ultra Wideband for Wireless Communications will aslo...