2,449 research outputs found
An Adaptive Algorithm to Optimize the Dynamics of IEEE 802.15.4 Networks
Presentado en ICST 2013IEEE 802.15.4 standard is becoming one of the most popular technologies for the deployment of low rate Wireless Personal Area Networks with strong power constraints. In order to reduce the energy consumption, beacon-enabled networks with long network inactive periods can be employed. However, the duration of these inactivity periods, as some other configuration parameters, are conventionally set to default values and remain fixed during the whole network operation. This implies that if they are misconfigured the network will not adapt to changes in the conditions of the environment, particularly to the most determining one, i.e. the traffic load. This paper proposes a simple procedure for the dynamic adaptation of several key parameters of IEEE 802.15.4 networks. Under this procedure, the 802.15.4 parameters are modified as a function of the existing traffic conditions.Spanish National Project No.TEC2009-13763-C02-01
A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Network
A Wireless Body Area Network (WBAN) is a collection of low-power and
lightweight wireless sensor nodes that are used to monitor the human body
functions and the surrounding environment. It supports a number of innovative
and interesting applications, including ubiquitous healthcare and Consumer
Electronics (CE) applications. Since WBAN nodes are used to collect sensitive
(life-critical) information and may operate in hostile environments, they
require strict security mechanisms to prevent malicious interaction with the
system. In this paper, we first highlight major security requirements and
Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control
(MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4
security framework and identify the security vulnerabilities and major attacks
in the context of WBAN. Different types of attacks on the Contention Access
Period (CAP) and Contention Free Period (CFP) parts of the superframe are
analyzed and discussed. It is observed that a smart attacker can successfully
corrupt an increasing number of GTS slots in the CFP period and can
considerably affect the Quality of Service (QoS) in WBAN (since most of the
data is carried in CFP period). As we increase the number of smart attackers
the corrupted GTS slots are eventually increased, which prevents the legitimate
nodes to utilize the bandwidth efficiently. This means that the direct
adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure
for certain WBAN applications. New solutions are required to integrate high
level security in WBAN.Comment: 14 pages, 7 figures, 2 table
Design and analysis of a beacon-less routing protocol for large volume content dissemination in vehicular ad hoc networks
Largevolumecontentdisseminationispursuedbythegrowingnumberofhighquality applications for Vehicular Ad hoc NETworks(VANETs), e.g., the live road surveillance service and the video-based overtaking assistant service. For the highly dynamical vehicular network topology, beacon-less routing protocols have been proven to be efficient in achieving a balance between the system performance and the control overhead. However, to the authors’ best knowledge, the routing design for large volume content has not been well considered in the previous work, which will introduce new challenges, e.g., the enhanced connectivity requirement for a radio link. In this paper, a link Lifetime-aware Beacon-less Routing Protocol (LBRP) is designed for large volume content delivery in VANETs. Each vehicle makes the forwarding decision based on the message header information and its current state, including the speed and position information. A semi-Markov process analytical model is proposed to evaluate the expected delay in constructing one routing path for LBRP. Simulations show that the proposed LBRP scheme outperforms the traditional dissemination protocols in providing a low end-to-end delay. The analytical model is shown to exhibit a good match on the delay estimation with Monte Carlo simulations, as well
An Approximate Inner Bound to the QoS Aware Throughput Region of a Tree Network under IEEE 802.15.4 CSMA/CA and Application to Wireless Sensor Network Design
We consider a tree network spanning a set of source nodes that generate
measurement packets, a set of additional relay nodes that only forward packets
from the sources, and a data sink. We assume that the paths from the sources to
the sink have bounded hop count. We assume that the nodes use the IEEE 802.15.4
CSMA/CA for medium access control, and that there are no hidden terminals. In
this setting, starting with a set of simple fixed point equations, we derive
sufficient conditions for the tree network to approximately satisfy certain
given QoS targets such as end-to-end delivery probability and delay under a
given rate of generation of measurement packets at the sources (arrival rates
vector). The structures of our sufficient conditions provide insight on the
dependence of the network performance on the arrival rate vector, and the
topological properties of the network. Furthermore, for the special case of
equal arrival rates, default backoff parameters, and for a range of values of
target QoS, we show that among all path-length-bounded trees (spanning a given
set of sources and BS) that meet the sufficient conditions, a shortest path
tree achieves the maximum throughput
Proportional fairness in wireless powered CSMA/CA based IoT networks
This paper considers the deployment of a hybrid wireless data/power access
point in an 802.11-based wireless powered IoT network. The proportionally fair
allocation of throughputs across IoT nodes is considered under the constraints
of energy neutrality and CPU capability for each device. The joint optimization
of wireless powering and data communication resources takes the CSMA/CA random
channel access features, e.g. the backoff procedure, collisions, protocol
overhead into account. Numerical results show that the optimized solution can
effectively balance individual throughput across nodes, and meanwhile
proportionally maximize the overall sum throughput under energy constraints.Comment: Accepted by Globecom 201
Cross-Layer Adaptive Feedback Scheduling of Wireless Control Systems
There is a trend towards using wireless technologies in networked control
systems. However, the adverse properties of the radio channels make it
difficult to design and implement control systems in wireless environments. To
attack the uncertainty in available communication resources in wireless control
systems closed over WLAN, a cross-layer adaptive feedback scheduling (CLAFS)
scheme is developed, which takes advantage of the co-design of control and
wireless communications. By exploiting cross-layer design, CLAFS adjusts the
sampling periods of control systems at the application layer based on
information about deadline miss ratio and transmission rate from the physical
layer. Within the framework of feedback scheduling, the control performance is
maximized through controlling the deadline miss ratio. Key design parameters of
the feedback scheduler are adapted to dynamic changes in the channel condition.
An event-driven invocation mechanism for the feedback scheduler is also
developed. Simulation results show that the proposed approach is efficient in
dealing with channel capacity variations and noise interference, thus providing
an enabling technology for control over WLAN.Comment: 17 pages, 12 figures; Open Access at
http://www.mdpi.org/sensors/papers/s8074265.pd
- …