1,129 research outputs found
Applications of Repeated Games in Wireless Networks: A Survey
A repeated game is an effective tool to model interactions and conflicts for
players aiming to achieve their objectives in a long-term basis. Contrary to
static noncooperative games that model an interaction among players in only one
period, in repeated games, interactions of players repeat for multiple periods;
and thus the players become aware of other players' past behaviors and their
future benefits, and will adapt their behavior accordingly. In wireless
networks, conflicts among wireless nodes can lead to selfish behaviors,
resulting in poor network performances and detrimental individual payoffs. In
this paper, we survey the applications of repeated games in different wireless
networks. The main goal is to demonstrate the use of repeated games to
encourage wireless nodes to cooperate, thereby improving network performances
and avoiding network disruption due to selfish behaviors. Furthermore, various
problems in wireless networks and variations of repeated game models together
with the corresponding solutions are discussed in this survey. Finally, we
outline some open issues and future research directions.Comment: 32 pages, 15 figures, 5 tables, 168 reference
Adoption of vehicular ad hoc networking protocols by networked robots
This paper focuses on the utilization of wireless networking in the robotics domain. Many researchers have already equipped their robots with wireless communication capabilities, stimulated by the observation that multi-robot systems tend to have several advantages over their single-robot counterparts. Typically, this integration of wireless communication is tackled in a quite pragmatic manner, only a few authors presented novel Robotic Ad Hoc Network (RANET) protocols that were designed specifically with robotic use cases in mind. This is in sharp contrast with the domain of vehicular ad hoc networks (VANET). This observation is the starting point of this paper. If the results of previous efforts focusing on VANET protocols could be reused in the RANET domain, this could lead to rapid progress in the field of networked robots. To investigate this possibility, this paper provides a thorough overview of the related work in the domain of robotic and vehicular ad hoc networks. Based on this information, an exhaustive list of requirements is defined for both types. It is concluded that the most significant difference lies in the fact that VANET protocols are oriented towards low throughput messaging, while RANET protocols have to support high throughput media streaming as well. Although not always with equal importance, all other defined requirements are valid for both protocols. This leads to the conclusion that cross-fertilization between them is an appealing approach for future RANET research. To support such developments, this paper concludes with the definition of an appropriate working plan
Robotic Wireless Sensor Networks
In this chapter, we present a literature survey of an emerging, cutting-edge,
and multi-disciplinary field of research at the intersection of Robotics and
Wireless Sensor Networks (WSN) which we refer to as Robotic Wireless Sensor
Networks (RWSN). We define a RWSN as an autonomous networked multi-robot system
that aims to achieve certain sensing goals while meeting and maintaining
certain communication performance requirements, through cooperative control,
learning and adaptation. While both of the component areas, i.e., Robotics and
WSN, are very well-known and well-explored, there exist a whole set of new
opportunities and research directions at the intersection of these two fields
which are relatively or even completely unexplored. One such example would be
the use of a set of robotic routers to set up a temporary communication path
between a sender and a receiver that uses the controlled mobility to the
advantage of packet routing. We find that there exist only a limited number of
articles to be directly categorized as RWSN related works whereas there exist a
range of articles in the robotics and the WSN literature that are also relevant
to this new field of research. To connect the dots, we first identify the core
problems and research trends related to RWSN such as connectivity,
localization, routing, and robust flow of information. Next, we classify the
existing research on RWSN as well as the relevant state-of-the-arts from
robotics and WSN community according to the problems and trends identified in
the first step. Lastly, we analyze what is missing in the existing literature,
and identify topics that require more research attention in the future
On the optimal operation of wireless networks
With the ever increasing mobile traffic in wireless networks, radio frequency spectrum is becoming limited and overcrowded. To address the radio frequency spectrum scarcity problem, researchers proposed advanced radio technology-Cognitive Radio to make use of the uncommonly used and under-utilized licensed bands to improve overall spectrum efficiency. Mobile service providers also deploy small base stations on the streets, into shopping center and users\u27 households in order to improve spectrum efficiency per area. In this thesis, we study cooperation schemes in cognitive radio networks as well as heterogeneous networks to reuse the existing radio frequency spectrum intelligently and improve network throughput and spectrum efficiency, reduce network power consumption and provide network failure protection capability.
In the first work of the thesis, we study a multicast routing problem in Cognitive Ratio Networks (CRNs). In this work, all Secondary Users (SUs) are assumed not self interested and they are willing to provide relay service for source SUs. We propose a new network modeling method, where we model CRNs using a Multi-rate Multilayer Hyper-Graph (MMHG). Given a multicast session of the MMHG, our goal is to find the multicast routing trees that minimize the worst case end-to-end delay, maximize the multicast rate and minimize the number of transmission links used in the multicast tree. We apply two metaheuristic algorithms (Multi-Objective Ant Colony System optimization algorithm (MOACS) and Archived Multi-Objective Simulated Annealing Optimization Algorithm (AMOSA)) in solving the problem. We also study the scheduling problem of multicast routing trees obtained from the MMHG model.
In the second work of the thesis, we study the cell outage compensation function of the self-healing mechanism using network cooperation scheme. In a heterogeneous network environment with densely deployed Femto Base Stations (FBSs), we propose a network cooperation scheme for FBSs using Coordinated Multi-Point (CoMP) transmission and reception with joint processing technique. Different clustering methods are studied to improve the performance of the network cooperation scheme.
In the final work of the thesis, we study the user cooperative multi-path routing solution for wireless Users Equipment (UEs)\u27 streaming application using auction theory. We assume that UEs use multi-path transport layer service, and establish two paths for streaming events, one path goes through its cellular link, another path is established using a Wi-Fi connection with a neighbor UE. We study user coordinated multi-path routing solution with two different energy cost functions (LCF and EAC) and design user cooperative real-time optimization and failure protection operations for the streaming application. To stimulate UEs to participate into the user cooperation operation, we design a credit system enabled with auction mechanism.
Simulation results in this thesis show that optimal cooperation operations among network devices to reuse the existing spectrum wisely are able to improve network performance considerably. Our proposed network modeling approach in CRN helps reduce the complicated multicast routing problem to a simple graph problem, and the proposed algorithms can find most of the optimal multicast routing trees in a short amount of time. In the second and third works, our proposed network cooperation and user cooperation approaches are shown to provide better UEs\u27 throughput compared to non-cooperation schemes. The network cooperation approach using CoMP provides failure compensation capability by preventing the system sum rate loss from having the same speed of radio resource loss, and this is done without using additional radio resources and will not have a significant adverse effect on the performance of other UEs. The user cooperation approach shows great advantage in improving service rate, improving streaming event success rate and reducing energy consumption compared to non-cooperation solution
Security and Privacy Issues in Wireless Mesh Networks: A Survey
This book chapter identifies various security threats in wireless mesh
network (WMN). Keeping in mind the critical requirement of security and user
privacy in WMNs, this chapter provides a comprehensive overview of various
possible attacks on different layers of the communication protocol stack for
WMNs and their corresponding defense mechanisms. First, it identifies the
security vulnerabilities in the physical, link, network, transport, application
layers. Furthermore, various possible attacks on the key management protocols,
user authentication and access control protocols, and user privacy preservation
protocols are presented. After enumerating various possible attacks, the
chapter provides a detailed discussion on various existing security mechanisms
and protocols to defend against and wherever possible prevent the possible
attacks. Comparative analyses are also presented on the security schemes with
regards to the cryptographic schemes used, key management strategies deployed,
use of any trusted third party, computation and communication overhead involved
etc. The chapter then presents a brief discussion on various trust management
approaches for WMNs since trust and reputation-based schemes are increasingly
becoming popular for enforcing security in wireless networks. A number of open
problems in security and privacy issues for WMNs are subsequently discussed
before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the
author's previous submission in arXiv submission: arXiv:1102.1226. There are
some text overlaps with the previous submissio
- …