59 research outputs found

    Novel bandwidth strategy for wireless P2P file sharing

    Get PDF
    With the rapid development of the mobile device technology and wireless network technology, the need of an efficient file sharing method on wireless network becomes more and more significant. Peer-to-Peer(P2P) file distribution, as a quite popular method being used now, is a promising choice. However, the limitation of bandwidth of wireless networks greatly restricts the performance of wireless P2P. In this paper, we propose a new idea of better utilizing the limited bandwidth to improve the file distribution performance. The criteria of an optimal splitting of the half-duplex bandwidth is deduced with mathematical analysis. To achieve a further improvement on the average distribution time, we also propose a grouping strategy which works with the bandwidth strategy. Simulation results show that our mechanism can efficiently reduce the file distribution time among wireless peers. © 2011 IEEE.published_or_final_versionThe 2011 IEEE Wireless Communications and Networking Conference (WCNC), Cancun, Mexico, 28-31 March 2011. In IEEE Wireless Communications and Networking Conference Proceedings, 2011, p. 2161-216

    Variable power broadcasting based on local information for source-dependent broadcasting protocols

    Get PDF
    A typical broadcasting protocol for wireless network usually involves fixed transmission power that covers, for example an area within 250 meters (m). However, it is often unnecessary to broadcast using fixed power because a node that needs to be covered may just be 100m away. By reducing the transmission power enough to cover this node, energy expenditure would be reduced, thus, prolonging the lifetime of battery-powered wireless networks such as Mobile Ad Hoc Networks (MANETs) and Wireless Sensor Networks (WSNs). Existing source-dependent broadcasting protocols do not have any mechanisms for adjusting the transmission power of nodes. Therefore, this paper proposes some effective mechanisms based on local neighborhood knowledge, while ensuring the overall network is still covered. Results of extensive simulations confirm the effectiveness of the proposed protocols in reducing energy consumption. © 2011 IEEE.published_or_final_versionThe 2011 IEEE Wireless Communications and Networking Conference (WCNC), Cancun, Mexico, 28-31 March 2011. In Proceedings of IEEE WCNC, 2011, p. 796-80

    Optimization of Wi-Fi Access Point Placement for Indoor Localization

    Get PDF
    The popularity of location based applications is undiminished today. They require accurate location information which is a challenging issue in indoor environments. Wireless technologies can help derive indoor positioning data. Especially, the Wi-Fi technology is a promising candidate due to the existing and almost ubiquitous Wi-Fi infrastructure. The already deployed Wi-Fi devices can also serve as reference points for localization eliminating the cost of setting up a dedicated system. However, the primary purpose of these Wi-Fi systems is data communication and not providing location services. Thus their positioning accuracy might be insufficient. This accuracy can be increased by carefully placing the Wi-Fi access points to cover the given territory properly. In this paper, our contribution is a method based on simulated annealing, what we propose to find the optimal number and placement of Wi-Fi access points with regard to indoor positioning. We investigate its performance in a real environment scenario via simulations

    Performance analysis of wireless communication system in general fading environment subjected to shadowing and interference

    Get PDF
    In this paper, performance analysis of wireless communication over α−η−μ fading channels has been investigated. First, analysis has been carried out for the case when communication is subjected to the influence of co-channel interference. Closed-form expressions have been derived for the probability density function and cumulative distribution function of the received signal-to-interference ratio. Outage probability has been obtained for this case, in the function of various values of system parameters, and also for the case when selection diversity has been presented at the reception. Further, simultaneous multipath fading and shadowing occurrence has been analyzed, through deriving novel composite Gamma long-time faded α−η−μ fading distribution. First-order statistical parameters have been obtained in closed form, for this novel composite distribution, and capitalizing on them, standard performance measures have been efficiently evaluated, graphically presented and discussed in the function of system parameters

    Byzantine Attack and Defense in Cognitive Radio Networks: A Survey

    Full text link
    The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the success of cognitive radio networks (CRNs). In the past couple of years, the research on the Byzantine attack and defense strategies has gained worldwide increasing attention. In this paper, we provide a comprehensive survey and tutorial on the recent advances in the Byzantine attack and defense for CSS in CRNs. Specifically, we first briefly present the preliminaries of CSS for general readers, including signal detection techniques, hypothesis testing, and data fusion. Second, we analyze the spear and shield relation between Byzantine attack and defense from three aspects: the vulnerability of CSS to attack, the obstacles in CSS to defense, and the games between attack and defense. Then, we propose a taxonomy of the existing Byzantine attack behaviors and elaborate on the corresponding attack parameters, which determine where, who, how, and when to launch attacks. Next, from the perspectives of homogeneous or heterogeneous scenarios, we classify the existing defense algorithms, and provide an in-depth tutorial on the state-of-the-art Byzantine defense schemes, commonly known as robust or secure CSS in the literature. Furthermore, we highlight the unsolved research challenges and depict the future research directions.Comment: Accepted by IEEE Communications Surveys and Tutoiral

    A Query Result Merging Scheme for Providing Energy Efficiency in Underwater Sensor Networks

    Get PDF
    Underwater sensor networks are emerging as a promising distributed data management system for various applications in underwater environments, despite their limited accessibility and restricted energy capacity. With the aid of recent developments in ubiquitous data computing, an increasing number of users are expected to overcome low accessibility by applying queries to underwater sensor networks. However, when multiple users send queries to an underwater sensor network in a disorganized manner, it may incur lethal energy waste and problematic network traffic. The current query management mechanisms cannot effectively deal with this matter due to their limited applicability and unrealistic assumptions. In this paper, a novel query management scheme involving query result merging is proposed for underwater sensor networks. The mechanism is based on a relational database model and is adjusted to the practical restrictions affecting underwater communication environments. Network simulations will prove that the scheme becomes more efficient with a greater number of queries and a smaller period range

    Video Streaming over Vehicular Ad Hoc Networks: A Comparative Study and Future Perspectives

    Get PDF
    Vehicular  Ad Hoc Network  (VANET) is emerged as an important research area that provides ubiquitous short-range connectivity among moving vehicles.  This network enables efficient traffic safety and infotainment applications. One of the promising applications is video transmission in vehicle-to-vehicle or vehicle-to-infrastructure environments.  But, video streaming over vehicular environment is a daunting task due to high movement of vehicles. This paper presents a survey on state-of-arts of video streaming over VANET. Furthermore, taxonomy of vehicular video transmission is highlighted in this paper with special focus on significant applications and their requirements with challenges, video content sharing, multi-source video streaming and video broadcast services. The comparative study of the paper compares the video streaming schemes based on type of error resilient technique, objective of study, summary of their study, the utilized simulator and the type of video sharing.  Lastly, we discussed the open issues and research directions related to video communication over VANET

    Energy-Aware Topology Control Strategy for Human-Centric Wireless Sensor Networks

    Get PDF
    The adoption of mobile and ubiquitous solutions that involve participatory or opportunistic sensing increases every day. This situation has highlighted the relevance of optimizing the energy consumption of these solutions, because their operation depends on the devices’ battery lifetimes. This article presents a study that intends to understand how the prediction of topology control messages in human-centric wireless sensor networks can be used to help reduce the energy consumption of the participating devices. In order to do that, five research questions have been defined and a study based on simulations was conducted to answer these questions. The obtained results help identify suitable mobile computing scenarios where the prediction of topology control messages can be used to save energy of the network nodes. These results also allow estimating the percentage of energy saving that can be expected, according to the features of the work scenario and the participants behavior. Designers of mobile collaborative applications that involve participatory or opportunistic sensing, can take advantage of these findings to increase the autonomy of their solutions.Fil: Meseguer, Roc . Universidad Politecnica de Catalunya; EspañaFil: Molina, Carlos. Universitat Rovira I Virgili; EspañaFil: Ochoa, Sergio F.. Universidad de Chile; ChileFil: Santos, Rodrigo Martin. Universidad Nacional del Sur. Departamento de Ingenieria Electrica y de Computadoras. Laboratorio de Sistemas Digitales; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Bahía Blanca. Instituto de Investigación en Ingeniería Eléctrica; Argentin

    A review of cyber threats and defence approaches in emergency management

    Get PDF
    Emergency planners, first responders and relief workers increasingly rely on computational and communication systems that support all aspects of emergency management, from mitigation and preparedness to response and recovery. Failure of these systems, whether accidental or because of malicious action, can have severe implications for emergency management. Accidental failures have been extensively documented in the past and significant effort has been put into the development and introduction of more resilient technologies. At the same time researchers have been raising concerns about the potential of cyber attacks to cause physical disasters or to maximise the impact of one by intentionally impeding the work of the emergency services. Here, we provide a review of current research on the cyber threats to communication, sensing, information management and vehicular technologies used in emergency management. We emphasise on open issues for research, which are the cyber threats that have the potential to affect emergency management severely and for which solutions have not yet been proposed in the literature
    corecore