3,106 research outputs found
Recommended from our members
Improving multiple broadcasting of multimedia traffic in wireless ad-hoc networks
The increasing use of multimedia streaming applications in addition with advent of internet television and radio, demands from today's wireless networks to handle with reliability multiple broadcasting and multicasting sources. However, the way that 802.11 standard, which is the primary technology in wireless networking, handle this type of traffic raises a series of problems mainly related to the lack of an effective feedback mechanism. This lack in turn, limits the capability of random backoff process to eliminate collisions and reduce reliability and fairness. This inherited drawback of the standard is affecting the way broadcast and multicast traffic is transmitted as well as the overall performance of the network. In this paper initially we are highlighting the drawback of the IEEE 802.11 MAC algorithm in handling multiple stations “media type” data broadcasting in an ad-hoc wireless network. Then, we propose two different approaches in alleviating these problems. The first approach is the simple linear increase of the contention window (CW) while the second propose a linear increase of the CW implementing an exclusive backoff number allocation (EBNA) algorithm. In addition we are modifying the 802.11 medium access control (MAC) algorithm to use the clear to send to self (CTS-to-Self) protection mechanism prior to every transmission. Both the above techniques are simulated and compared with the classic 802.11 MAC. The results show that the overall performance of the network can be improved using these alternative MAC methods
Secure Routing in Wireless Mesh Networks
Wireless mesh networks (WMNs) have emerged as a promising concept to meet the
challenges in next-generation networks such as providing flexible, adaptive,
and reconfigurable architecture while offering cost-effective solutions to the
service providers. Unlike traditional Wi-Fi networks, with each access point
(AP) connected to the wired network, in WMNs only a subset of the APs are
required to be connected to the wired network. The APs that are connected to
the wired network are called the Internet gateways (IGWs), while the APs that
do not have wired connections are called the mesh routers (MRs). The MRs are
connected to the IGWs using multi-hop communication. The IGWs provide access to
conventional clients and interconnect ad hoc, sensor, cellular, and other
networks to the Internet. However, most of the existing routing protocols for
WMNs are extensions of protocols originally designed for mobile ad hoc networks
(MANETs) and thus they perform sub-optimally. Moreover, most routing protocols
for WMNs are designed without security issues in mind, where the nodes are all
assumed to be honest. In practical deployment scenarios, this assumption does
not hold. This chapter provides a comprehensive overview of security issues in
WMNs and then particularly focuses on secure routing in these networks. First,
it identifies security vulnerabilities in the medium access control (MAC) and
the network layers. Various possibilities of compromising data confidentiality,
data integrity, replay attacks and offline cryptanalysis are also discussed.
Then various types of attacks in the MAC and the network layers are discussed.
After enumerating the various types of attacks on the MAC and the network
layer, the chapter briefly discusses on some of the preventive mechanisms for
these attacks.Comment: 44 pages, 17 figures, 5 table
To mesh or not to mesh: flexible wireless indoor communication among mobile robots in industrial environments
Mobile robots such as automated guided vehicles become increasingly important in industry as they can greatly increase efficiency. For their operation such robots must rely on wireless communication, typically realized by connecting them to an existing enterprise network. In this paper we motivate that such an approach is not always economically viable or might result in performance issues. Therefore we propose a flexible and configurable mixed architecture that leverages on mesh capabilities whenever appropriate. Through experiments on a wireless testbed for a variety of scenarios, we analyse the impact of roaming, mobility and traffic separation and demonstrate the potential of our approach
A security architecture for personal networks
Abstract Personal Network (PN) is a new concept utilizing pervasive computing to meet the needs of the user. As PNs edge closer towards reality, security becomes an important concern since any vulnerability in the system will limit its practical use. In this paper we introduce a security architecture designed for PNs. Our aim is to use secure but lightweight mechanisms suitable for resource constrained devices and wireless communication. We support pair-wise keys for secure cluster formation and use group keys for securing intra-cluster communication. In order to analyze the performance of our proposed mechanisms, we carry out simulations using ns-2. The results show that our mechanisms have a low overhead in terms of delay and energy consumption
- …