201 research outputs found

    RTXP : A Localized Real-Time Mac-Routing Protocol for Wireless Sensor Networks

    Get PDF
    Protocols developed during the last years for Wireless Sensor Networks (WSNs) are mainly focused on energy efficiency and autonomous mechanisms (e.g. self-organization, self-configuration, etc). Nevertheless, with new WSN applications, appear new QoS requirements such as time constraints. Real-time applications require the packets to be delivered before a known time bound which depends on the application requirements. We particularly focus on applications which consist in alarms sent to the sink node. We propose Real-Time X-layer Protocol (RTXP), a real-time communication protocol. To the best of our knowledge, RTXP is the first MAC and routing real-time communication protocol that is not centralized, but instead relies only on local information. The solution is cross-layer (X-layer) because it allows to control the delays due to MAC and Routing layers interactions. RTXP uses a suited hop-count-based Virtual Coordinate System which allows deterministic medium access and forwarder selection. In this paper we describe the protocol mechanisms. We give theoretical bound on the end-to-end delay and the capacity of the protocol. Intensive simulation results confirm the theoretical predictions and allow to compare with a real-time centralized solution. RTXP is also simulated under harsh radio channel, in this case the radio link introduces probabilistic behavior. Nevertheless, we show that RTXP it performs better than a non-deterministic solution. It thus advocates for the usefulness of designing real-time (deterministic) protocols even for highly unreliable networks such as WSNs

    About the Capacity of Flat and Self-Organized Ad Hoc and Hybrid Networks

    Get PDF
    Ad hoc networking specific challenges foster a strong research effort on efficient protocols design. Routing protocols based on a self-organized structure have been studied principally for the robustness and the scalability they provide. On the other hand, self-organization schemes may decrease the network capacity since they concentrate the traffic on privileged links. This paper presents four models for evaluating the capacity of a routing schemes on 802.11 like networks. Our approach consists in modeling the radio resource sharing principles of 802.11 like MAC protocols as a set of linear constraints. We have implemented two models of fairness. The first one assumes that nodes have a fair access to the channel, while the second one assumes that on the radio links. We then develop a pessimistic and an optimistic scenarii of spatial re-utilization of the medium, yielding a lower bound and an upper bound on the network capacity for each fairness case. Our models are independent of the routing protocols and provide therefore a relevant framework for their comparison. We apply our models to a comparative analysis of the well-known shortest path base flat routing protocol OLSR against two main self-organized structure approaches, VSR, and Wu & Li's protocols. This study concludes on the relevance of self-organized approaches from the network capacity point of view

    Resilient networking in wireless sensor networks

    Get PDF
    This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In this report, we focus on the behavior of routing protocols to determine which properties make them more resilient to attacks. Our aim is to find some answers to the following questions. Are there any existing protocols, not designed initially for security, but which already contain some inherently resilient properties against attacks under which some portion of the network nodes is compromised? If yes, which specific behaviors are making these protocols more resilient? We propose in this report an overview of security strategies for WSNs in general, including existing attacks and defensive measures. In this report we focus at the network layer in particular, and an analysis of the behavior of four particular routing protocols is provided to determine their inherent resiliency to insider attacks. The protocols considered are: Dynamic Source Routing (DSR), Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing (RWR)

    On the Performances of the Routing Protocols in MANET: : Classical versus Self-Organized Approaches

    Get PDF
    International audienceMobile Ad Hoc Networks (MANET) are spontaneous wireless networks of mobile nodes without any fixed infrastructure. MANET are promised to a large spectrum of military or civilian utilizations. Routing is a key topic in such networks: overhead must be minimized, optimizing the delay and reducing the packet losses. Several routing protocols were proposed in the literature but, recently, new routing protocols based on a self-organization, like Virtual Structure Routing (VSR), were proposed. VSR is based on a self-organized structure with an important stability and persistence. In this paper, we aim to quantify the contribution of the self-organization on the routing behavior and performances. We oppose VSR as a self-organized protocol to the classical one: reactive (AODV), proactive (OLSR) and clustered (CBRP). The impact of the mobility and the density, the horizontal and the vertical scalabilities are studied

    Structure virtuelle pour une auto-organisation dans les réseaux ad hoc et hybrides

    Get PDF
    National audienceAd hoc networks are spontaneous wireless networks without any wired infrastructure of mobile terminals. We assume that an efficient network is achieved through a self-organization. Thus, we propose here a virtual structure allowing a self-organization, constituted by both a backbone and services areas. The backbone constitutes a connected structure to gather and disseminate the control traffic, representing a natural prolongation of backbone in wired networks. Services areas structure the network in separating the network in homogeneous zones managed by a clusterhead. Since terminals are mobile, we propose both construction and maintenance procedures in order to maintain an efficient and stable virtual structure, during all the network life. In order to create a stable virtual structure, we introduce a stability metric, depending on several criteria. Finally, a power-energy saving solution is proposed to optimize the network lifetime.Les réseaux ad hoc sont des réseaux spontanés sans fil et sans infrastructure fixe de terminaux mobiles. Nous pensons que l'utilisation efficace d'un tel réseau doit passer par son auto-organisation. Nous proposons ici une topologie virtuelle d'auto-organisation constituée à la fois d'une dorsale et de zones de services. La première, véritable prolongation des dorsales des réseaux filaires, permet de collecter le trafic de contrôle. Les zones de services structurent le réseau en le découpant en zones homogènes possédant chacune un chef. Puisque les terminaux sont mobiles, nous proposons à la fois une procédure de construction et de maintenance afin de maintenir une structure virtuelle stable et efficace tout au long de la vie du réseau. Afin de construire une structure virtuelle stable, nous introduisons une métrique de stabilité, dépendant de plusieurs critères. Enfin, nous proposons une solution d'économie d'énergie afin d'optimiser la durée de vie du réseau

    Robustness and Reliability for Virtual Topologies in Wireless Multihop Access Networks

    Get PDF
    International audienceMobile ad hoc networks (MANet) are a spontaneous collection of mobile terminals. Each node must collaborate in order to structure information exchange. An hybrid network is a MANet connected to Internet via an Access Point (AP). We propose to organize MANet and hybrid networks through a virtual topology. We consider a virtual topology as a hierarchical organization based on the integration of both backbone and clusters. Construction and maintenance procedures of such a virtual topology are detailed and deal with robustness and reliability issues. We present a proactive gratuitous maintenance for our backbone and a new maintenance algorithm for clusters presenting a reduced overhead. Moreover, this improved solution allows to integrate multiple APs in hybrid networks , deleting the previous single point of failure. A method to interconnect backbones is described, which is useful for many applications

    Virtual structure routing in ad hoc networks

    Get PDF
    International audienceRouting protocols are the main issue of ad hoc networks. Because flat propositions (reactive, proactive) are not sufficient and suffer from a lack of performance, new solutions should he investigated and proposed. On the other hand, virtual topologies propose to structure the network and to give a hierarchy between the strongest and the weakest nodes. We propose a new routing protocol, virtual structure routing (VSR), based on a virtual topology including both a backbone and clusters. The backbone is used to collect control traffic and to reduce overhead for route discovery. VSR uses clusters to define a route as a list of cluster IDs. This cluster topology is more stable than the physical topology. Hence, routes are more robust. VSR combines the assets of both flat approaches; intra-cluster routing is proactive while inter-cluster routing is reactive. Finally, routes are computed dynamically and a mechanism for route repair is proposed

    A self-organization structure for Hybrid Networks

    Get PDF
    International audienceThis paper focuses on the self-organization of ad hoc and hybrid networks. We propose to organize networks with two integrated virtual structures: a backbone and clusters. The backbone helps to optimize the flooding of control packets, and to offer a natural prolongation of the backbone of wired networks. Clusters help to hierarchize the network, each of which is managed logically by its clusterhead. Since MANETs are mobile, we propose distributed algorithms for both the construction and the maintenance to preserve an efficient virtual structure despite topology changes. Simulations results exhibit the robustness and persistence of the proposed virtual structure

    A virtual structure for hybrid networks

    Get PDF
    International audienceHybrid networks are heterogeneous networks merging both wireless and ad hoc nodes and where the interconnection to the IP world is an important topic through gateways called AP (access point). Indeed, each node can be contacted and can contact another node in the Internet. To reach that, architectures that support mobility management are studied. The solutions inspired by wired networks are not particularly suited to hybrid networks. We propose to use a virtual dynamic infrastructure including both backbone and clusters. A backbone is suited to spare energy, optimize control traffic diffusion and hierarchize participants. The clusters are intended to create service areas and to handle particularly the mobility management. We present algorithms to both construct and maintain such structure. This dynamic topology is robust according to mobility, and is well suited to implement mobility management and localization procedure. Finally, the number of backbone members and clusters are completely parameterizable according to the environment

    The Gain of Network Coding in Wireless Sensor Networking

    Get PDF
    Wireless Sensor Networks have some well known features such as low battery consumption, changing topology awareness, open environment, non reliable radio links, etc.In this paper, we investigate the benefits of Network Coding Wireless Sensor networking, especially resiliency.One of our main concern is the resiliency in Wireless Sensor Networks.We have seen that resiliency could be described as a multi dimensional metric \cite{5478822,erdene2011enhancing,6423640} taking parameters such as Average Delivery Ratio, Delay Efficiency, Energy Efficiency, Average Throughput and Delivery Fairness into account.Resiliency can then be graphically represented as a kiviat diagram created by the previous weighted parameters.In order to introduce these metrics, previous works have been leaded on the Random Gradient Based Routing, which proved good resiliency in malicious environment.We look for seeing the improvements in term of resiliency, when adding network coding in the Random Gradient Based Routing with malicious nodes
    • …
    corecore