251 research outputs found

    IEEE 802.11s Mesh Deterministic Access : Design and analysis

    Get PDF
    IEEE 802.11s is a draft IEEE 802.11 amendment for mesh networking, defining how wireless devices can interconnect to create an ad-hoc network. It includes some mesh-specific optional MAC enhancements like Mesh Deterministic Access, Common Channel Framework, Intra-mesh Congestion Control and Power Management. Mesh Deterministic Access (MDA) is an access method that allows MPs to access the channel at selected times (called MDAOPs) with lower contention than would otherwise be possible. In this work we study Mesh Deterministic Access (MDA) feature. Specifically: we implement 802.11s in ns-2 simulator and evaluate performance comparing results with those obtained with DCF. We also propose an improvement called Dynamic Relocation. Dynamic Relocation permits to overcome MDA limits by reallocating MDAOPs basing on statistics collected during transmission times. The effectiveness of MDA improved with Dynamic Relocation in a scenario with realistic traffic is then confirmed via a simulation analysis

    TCP-MAC Interaction in Multi-hop Ad-hoc Networks

    Get PDF

    Learning Robust Radio Frequency Fingerprints Using Deep Convolutional Neural Networks

    Get PDF
    Radio Frequency Fingerprinting (RFF) techniques, which attribute uniquely identifiable signal distortions to emitters via Machine Learning (ML) classifiers, are limited by fingerprint variability under different operational conditions. First, this work studied the effect of frequency channel for typical RFF techniques. Performance characterization using the multi-class Matthews Correlation Coefficient (MCC) revealed that using frequency channels other than those used to train the models leads to deterioration in MCC to under 0.05 (random guess), indicating that single-channel models are inadequate for realistic operation. Second, this work presented a novel way of studying fingerprint variability through Fingerprint Extraction through Distortion Reconstruction (FEDR), a neural network-based approach for quantifying signal distortions in a relative distortion latent space. Coupled with a Dense network, FEDR fingerprints were evaluated against common RFF techniques for up to 100 unseen classes, where FEDR achieved best performance with MCC ranging from 0.945 (5 classes) to 0.746 (100 classes), using 73% fewer training parameters than the next-best technique

    Experimental analysis of WiMAX and meshed Wi-Fi quality of service

    Get PDF
    Mestrado em Engenharia Electrónica e TelecomunicaçõesA indústria das telecomunicações tem sofrido uma evolução enorme nosúltimos anos. Tanto em termos de comunicações sem fios, como em termos deligações de banda larga, assistiu-se a uma adesão massiva por parte domercado, o que se traduziu num crescimento enorme, já que a tecnologia temque estar um passo à frente da procura, de forma a suprir as carências dosconsumidores. Assim, a evolução persegue um objectivo claro: possibilidadede possuir conectividade de banda larga em qualquer lugar e instante. Nestecontexto, aparecem as tecnologias WiMAX (Worldwide Interoperability forMicrowave Access) e WI-FI em Malha como possibilidades para atingir estefim. O tema desta dissertação incide no estudo das tecnologias de WiMAX e WI-FIem Malha, mais concretamente no estudo da Qualidade de Serviço (QoS)providenciada pelas normas IEEE 802.16 e IEEE 802.11s para serviços deVoIP e VoD. Esta tese apresenta a arquitectura desenvolvida para a correcta integração deQoS para serviços em tempo real no acesso à banda larga sem fios depróxima geração. De seguida, apresenta testes efectuados com osequipamentos disponíveis de WiMAX e WI-FI em Malha, de forma a mostrar ocorrecto comportamento da atribuição extremo-a-extremo de QoS nos cenáriosescolhidos com serviços em tempo real, bem como os efeitos da mobilidade natecnologia WI-FI em Malha. ABSTRACT: The telecommunication industry has suffered a massive evolution throughoutpast years. In terms of wireless communications, as well as broadbandconnections, we’ve seen a massive adoption by the market, which conductedinto an enormous growth, since the technology must always be one step aheadof the demand, in order to be to fulfill the needs of the consumers. Therefore,the evolution pursues one clear goal: the possibility to establish a broadbandconnection anywhere and anytime. In this context, the WiMAX (WorldwideInteroperability for Microwave Access) and Meshed WI-FI technologies appearas possibilities to reach this goal. The subject of this thesis is the study of both the WiMAX and Meshed WI-FItechnologies, and more concretely the study of the QoS provided by theIEEE802.16 and IEEE 802.11s standards to VoIP and VoD services. This thesis presents the architecture developed to provide the correctintegration of QoS for real-media traffic in next generation broadband wirelessaccess. It presents tests carried out with the available WiMAX and Meshed WI-FI equipments, to show the correct behavior in the attribution of end-to-endQoS in selected scenarios with real-time services, as well as mobility effects onWI-FI Wireless Mesh technology

    Gestion adaptative des ressources dans les réseaux maillés sans fil à multiples-radios multiples-canaux

    Full text link
    Depuis quelques années, la recherche dans le domaine des réseaux maillés sans fil ("Wireless Mesh Network (WMN)" en anglais) suscite un grand intérêt auprès de la communauté des chercheurs en télécommunications. Ceci est dû aux nombreux avantages que la technologie WMN offre, telles que l'installation facile et peu coûteuse, la connectivité fiable et l'interopérabilité flexible avec d'autres réseaux existants (réseaux Wi-Fi, réseaux WiMax, réseaux cellulaires, réseaux de capteurs, etc.). Cependant, plusieurs problèmes restent encore à résoudre comme le passage à l'échelle, la sécurité, la qualité de service (QdS), la gestion des ressources, etc. Ces problèmes persistent pour les WMNs, d'autant plus que le nombre des utilisateurs va en se multipliant. Il faut donc penser à améliorer les protocoles existants ou à en concevoir de nouveaux. L'objectif de notre recherche est de résoudre certaines des limitations rencontrées à l'heure actuelle dans les WMNs et d'améliorer la QdS des applications multimédia temps-réel (par exemple, la voix). Le travail de recherche de cette thèse sera divisé essentiellement en trois principaux volets: le contrôle d‟admission du trafic, la différentiation du trafic et la réaffectation adaptative des canaux lors de la présence du trafic en relève ("handoff" en anglais). Dans le premier volet, nous proposons un mécanisme distribué de contrôle d'admission se basant sur le concept des cliques (une clique correspond à un sous-ensemble de liens logiques qui interfèrent les uns avec les autres) dans un réseau à multiples-sauts, multiples-radios et multiples-canaux, appelé RCAC. Nous proposons en particulier un modèle analytique qui calcule le ratio approprié d'admission du trafic et qui garantit une probabilité de perte de paquets dans le réseau n'excédant pas un seuil prédéfini. Le mécanisme RCAC permet d‟assurer la QdS requise pour les flux entrants, sans dégrader la QdS des flux existants. Il permet aussi d‟assurer la QdS en termes de longueur du délai de bout en bout pour les divers flux. Le deuxième volet traite de la différentiation de services dans le protocole IEEE 802.11s afin de permettre une meilleure QdS, notamment pour les applications avec des contraintes temporelles (par exemple, voix, visioconférence). À cet égard, nous proposons un mécanisme d'ajustement de tranches de temps ("time-slots"), selon la classe de service, ED-MDA (Enhanced Differentiated-Mesh Deterministic Access), combiné à un algorithme efficace de contrôle d'admission EAC (Efficient Admission Control), afin de permettre une utilisation élevée et efficace des ressources. Le mécanisme EAC prend en compte le trafic en relève et lui attribue une priorité supérieure par rapport au nouveau trafic pour minimiser les interruptions de communications en cours. Dans le troisième volet, nous nous intéressons à minimiser le surcoût et le délai de re-routage des utilisateurs mobiles et/ou des applications multimédia en réaffectant les canaux dans les WMNs à Multiples-Radios (MR-WMNs). En premier lieu, nous proposons un modèle d'optimisation qui maximise le débit, améliore l'équité entre utilisateurs et minimise le surcoût dû à la relève des appels. Ce modèle a été résolu par le logiciel CPLEX pour un nombre limité de noeuds. En second lieu, nous élaborons des heuristiques/méta-heuristiques centralisées pour permettre de résoudre ce modèle pour des réseaux de taille réelle. Finalement, nous proposons un algorithme pour réaffecter en temps-réel et de façon prudente les canaux aux interfaces. Cet algorithme a pour objectif de minimiser le surcoût et le délai du re-routage spécialement du trafic dynamique généré par les appels en relève. Ensuite, ce mécanisme est amélioré en prenant en compte l‟équilibrage de la charge entre cliques.In the last few years, Wireless Mesh Networks (WMNs) area brought a new field of advanced research among network specialized scientists. This is due to the many advantages which WMN technology offers, such as: easy and inexpensive installation, reliable connectivity and flexible interoperability with other existing networks (Wi-Fi, WiMax, Cellular, Sensors, WPAN networks, etc.). However, several problems still remain to be solved such as the scalability, the security, the quality of service (QoS), the resources management, etc. These problems persist for WMNs, therefore the researchers propose to improve the existing protocols or to conceive new protocols for WMNs. In order to solve some of the current limitations met in the wireless networks and to improve QoS of real time multimedia applications in such networks, our research will be divided primarily into three parts: traffic admission control, traffic differentiation and handoff-aware channel assignment schemes. In the first part, we propose a distributed admission control scheme for WMNs, namely, Routing on Cliques (a clique is defined as a subset of logical links that interfere with each other) Admission Control (RCAC). Particularly, we propose an analytical model to compute the appropriate acceptance ratio and guarantee that the packet loss probability in the network does not exceed a threshold value. The model also allows computing end-to-end delay to process flow requests with delay constraints. In the second part, we design an efficient scheduler for Mesh Deterministic Access (MDA) in IEEE 802.11s-based WMNs, called Enhanced Differentiated-MDA (ED-MDA) to support voice and video applications with strict requirements on delay and on blocking/dropping probability. ED-MDA together with Enhanced Admission Control, namely EAC, reserves the minimum amount of necessary resources while maintaining an acceptable handoff call dropping and high resource utilization. The final section addresses handoff-aware channel assignment (CA) problem in Multiple Radios WMNs (MR-WMNs). In this section, we first propose a multi-objective optimization model that, besides maximizing throughput, improves fairness and handoff experience of mesh clients. In this model, the Jain’s index is used to maximize users’ fairness and to allow same channel assignments to links involved in the same high handoff traffic, thus reducing handoff-triggered re-routing characterized by its high latency. Second, we solved this model to obtain exact solutions by the CPLEX software for a limited number of nodes. We therefore propose to use centralized heuristics/meta-heuristics algorithms as an offline CA process to obtain near-optimal solutions for larger instances (real size network). Moreover, in order to adapt to traffic dynamics caused especially by user handoffs, an online CA scheme is proposed that carefully re-assigns channels to interfaces with the purpose of continuously minimizing the re-routing overhead/latency during user handoffs. This online scheme is improved using load balancing

    Standards-Based Wireless Sensor Networking Protocols for Spaceflight Applications

    Get PDF
    Wireless sensor networks (WSNs) have the capacity to revolutionize data gathering in both spaceflight and terrestrial applications. WSNs provide a huge advantage over traditional, wired instrumentation since they do not require wiring trunks to connect sensors to a central hub. This allows for easy sensor installation in hard to reach locations, easy expansion of the number of sensors or sensing modalities, and reduction in both system cost and weight. While this technology offers unprecedented flexibility and adaptability, implementing it in practice is not without its difficulties. Recent advances in standards-based WSN protocols for industrial control applications have come a long way to solving many of the challenges facing practical WSN deployments. In this paper, we will overview two of the more promising candidates - WirelessHART from the HART Communication Foundation and ISA100.11a from the International Society of Automation - and present the architecture for a new standards-based sensor node for networking and applications research

    Improved Wireless Security through Physical Layer Protocol Manipulation and Radio Frequency Fingerprinting

    Get PDF
    Wireless networks are particularly vulnerable to spoofing and route poisoning attacks due to the contested transmission medium. Traditional bit-layer defenses including encryption keys and MAC address control lists are vulnerable to extraction and identity spoofing, respectively. This dissertation explores three novel strategies to leverage the wireless physical layer to improve security in low-rate wireless personal area networks. The first, physical layer protocol manipulation, identifies true transceiver design within remote devices through analysis of replies in response to packets transmitted with modified physical layer headers. Results herein demonstrate a methodology that correctly differentiates among six IEEE 802.15.4 transceiver classes with greater than 99% accuracy, regardless of claimed bit-layer identity. The second strategy, radio frequency fingerprinting, accurately identifies the true source of every wireless transmission in a network, even among devices of the same design and manufacturer. Results suggest that even low-cost signal collection receivers can achieve greater than 90% authentication accuracy within a defense system based on radio frequency fingerprinting. The third strategy, based on received signal strength quantification, can be leveraged to rapidly locate suspicious transmission sources and to perform physical security audits of critical networks. Results herein reduce mean absolute percentage error of a widely-utilized distance estimation model 20% by examining signal strength measurements from real-world networks in a military hospital and a civilian hospital
    • …
    corecore