548 research outputs found

    FastM: Design and Evaluation of a Fast Mobility Mechanism for Wireless Mesh Networks

    Get PDF
    Although there is a large volume of work in the literature in terms of mobility approaches for Wireless Mesh Networks, usually these approaches introduce high latency in the handover process and do not support realtime services and applications. Moreover, mobility is decoupled from routing, which leads to inefficiency to both mobility and routing approaches with respect to mobility. In this paper we present a new extension to proactive routing protocols using a fast mobility extension, FastM, with the purpose of increasing handover performance in Wireless Mesh Networks. With this new extension, a new concept is created to integrate information between neighbor wireless mesh routers, managing locations of clients associated to wireless mesh routers in a certain neighborhood, and avoiding packet loss during handover. The proposed mobility approach is able to optimize the handover process without imposing any modifications to the current IEE 802.11 MAC protocol and use unmodified clients. Results show the improved efficiency of the proposed scheme: metrics such as disconnection time, throughput, packet loss and control overhead are largely improved when compared to previous approaches. Moreover, these conclusions apply to mobility scenarios, although mobility decreases the performance of the handover approach, as expected

    Medium access control for inter-gateway handoff support in multi-hop wireless mesh networks

    Get PDF
    Wireless mesh networks (WMNs) have emerged to be a key wireless technology to support large-scale wireless Internet access. Seamless inter-gateway handoff support is an essential issue to ensure continuous communications in multi-hop WMNs. When the movement of a mobile mesh node (MN) causes its attachment point change in the Internet, the complete handoff process may include two steps: the link-layer handoff and the network-layer handoff. During the network-layer handoff, network- layer signaling packets need to be transmitted between the MN and the Internet via the multi-hop wireless mesh backbone. Due to the multi-hop transmission of network- layer handoff signaling packets, the handoff performance in WMNs can be largely degraded by the long queueing delay and medium access delay at each mesh router, especially when the backbone traffic volume is high. However, this critical issue is ignored in existing handoff solutions of multi-hop WMNs. In addition, the channel contention between data packets and handoff signaling packets is not considered in existing medium access control (MAC) designs. In this research, the seamless handoff support is addressed from a different perspec- tive. By eliminating channel contentions between data and handoff signaling pack- ets, the queueing delay and channel access delay of signaling packets are reduced, while data throughput is maintained. Since various WMNs have different channel resources and hardware cost requirements, four MAC schemes are proposed to im- prove the multi-hop handoff performance in single-channel single-radio, single-channel multi-radio, multi-channel single-radio, and multi-channel multi-radio WMNs. With the proposed MAC schemes, the inter-gateway handoff performance can be improved significantly in multi-hop WMNs

    MeshScan: a Fast and Efficient Handoff Scheme for IEEE 802.11 Wireless Mesh Networks

    Get PDF
    As a next generation network solution, Wireless Mesh Networks (WMN) provides fast Internet access to a large area, which is from university campus to city scale. In order to provide an uninterrupted Internet experience to a mobile client, a process called handoff is required to maintain the network connection from one Mesh Node (MN) to another MN. Ideally, handoff should be completely transparent to mobile users. A critical application like VoIP will require a handoff capability that transfers a call from one mesh node (MN) to another in less than 50 msec. However the current IEEE 802.11 standards do not address the handoff well. Studies have revealed that standard handoff on IEEE 802.11 WLANs incurs a latency of the order of hundreds of milliseconds to several seconds. Moreover, the discovery step in the handoff process accounts for more than 99% of this latency. The study addresses the latency in the discovery step by introducing an efficient and powerful client-side scan technique called MeshScan which replaces the discovery step with a unicast scan that transmits Authentication Request frames to potential MNs. A prototype of MeshScan has been developed based on the MadWifi WLAN driver on Linux operating systems. The feasibility of MeshScan to support fast handoff in WMNs has been demonstrated through extensive computer simulations and experiments under same given conditions. The results from the simulations and experiments show that the latency associated with handoff can be reduced from seconds to a few milliseconds by using the MeshScan technique. Furthermore, it is shown that MeshScan can continue to function effectively even under heavy traffic loads

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio

    Cognitive radio networks : quality of service considerations and enhancements

    Get PDF
    The explosive growth of wireless and mobile networks, such as the Internet of Things and 5G, has led to a massive number of devices that primarily use wireless channels within a limited range of the radio frequency spectrum (RFS). The use of RFS is heavily regulated, both nationally and internationally, and is divided into licensed and unlicensed bands. While many of the licensed wireless bands are underutilised, useable unlicensed bands are usually overcrowded, making the efficient use of RFS one of the critical challenges faced by future wireless communication technologies. The cognitive radio (CR) concept is proposed as a promising solution for the underutilisation of useful RFS bands. Fundamentally, CR technology is based on determining the unoccupied licensed RFS bands, called spectrum white spaces or holes, and accessing them to achieve better RFS utilisation and transmission propagation. The holes are the frequencies unused by the licensed user, or primary user (PU). Based on spectrum sensing, a CR node, or secondary user (SU), senses the surrounding spectrum periodically to detect any potential PU transmission in the current channel and to identify the available spectrum holes. Under current RFS regulations, SUs may use spectrum holes as long as their transmissions do not interfere with those of the PU. However, effective spectrum sensing can introduce overheads to a CR node operation. Such overheads affect the quality of service (QoS) of the running applications. Reducing the sensing impact on the QoS is one of the key challenges to adopting CR technology, and more studies of QoS issues related to implementing CR features are needed. This thesis aims to address these QoS issues in CR while considered the enhancement of RFS utilisation. This study concentrates on the spectrum sensing function, among other CR functions, because of its major impact on QoS and spectrum utilisation. Several spectrum sensing methods are reviewed to identify potential research gaps in analysing and addressing related QoS implications. It has been found that none of the well-known sensing techniques is suitable for all the diverse QoS requirements and RFS conditions: in fact, higher accuracy sensing methods cause a significant QoS degradation, as illustrated by several simulations in this work. For instance, QoS degradation caused by high-accuracy sensing has not yet been addressed in the IEEE 802.11e QoS mechanism used in the proposed CR standard, IEEE 802.11af (or White-Fi). This study finds that most of the strategies proposed to conduct sensing are based on a fixed sensing method that is not adaptable to the changeable nature of QoS requirements. In contrast, this work confirms the necessity of using various sensing techniques and parameters during a CR node operation for better performance

    An enhanced bridged-based multi-hop wireless network implementation

    Get PDF
    Proceedings of: 5th Annual ICST Wireless Internet Conference (WICON 2010), 1-3 March 2010, SingaporeIn this paper an enhanced Layer-2 multi-hop wireless network implementation for Infrastructure based Wireless Mesh Networks is presented. This work combines the flexibility of Layer-2 Wireless Bridging with the dynamic self-configuring capabilities of MANET routing. The main contribution of this paper is an investigation of the issues encountered when applying a pure bridging based solution to wireless multi-hop networks and the development of several mechanisms to overcome these problems. This work was implemented and deployed in a real testbed environment using Routerboard hardware and utilising a number of open-source network tools in accordance with the needs of our platform. The developed testbed incorporates self-healing and self-configuration features without requiring a traditional MANET routing protocol. Instead the 802.11 beacon frames sent by the Access Points were extended with link information to allow optimal construction of the mesh topology. Results are presented which demonstrate the automated topology construction mechanism. Further results also show the enhancements made to the normal 802.11 Layer-2 mobility mechanism.European Community's Seventh Framework ProgramPublicad

    Media independent handovers : network selection for mobile IP nodes in heterogeneous wireless networks

    Get PDF
    Includes abstract.Includes bibliographical references (p. 79-82).In Next Generation Networks (NGN), also known as 4G, Beyond 3G, Converged, Integrated and Interworked Network, user node mobility in wireless and wired environments will seamlessly cross disparate network boundaries. The effort to offer ubiquitous computing, providing access to services anywhere and anytime, strongly encourages the ability to roam across the different existing and future networks. Literature shows investigation of concepts such as Always Best Connected (ABC) when heterogeneous networks co-exist , which will work or compete with other schemes like Home Network Default (HND), Compatibility and Network Operator Agreements (CNOA) to guide network selection or access . With the variety of available networks, the mobile node may be faced with having to decide which network to connect to. We concentrate on the network selection aspects of these envisaged mobile, overlay and integrated environment in heterogeneous networks. The standard developments by the IEEE802.21 Working group and the IETF Networking group form the base of our approach that seeks to see mobility across heterogeneous networks a reality. We propose an IEEE802.21 Media Independent Handover Function (MIHF) based network discovery and network selection, leading to a handover. The selection may be further assisted by an MIHF capable Broker Node that is Third party to the Network Providers to provide a central yet distributed database of the available networks as encountered by the Mobile Node, to cater for Nodes with no prior knowledge of networks and software repository. A Mobile Node (MN) in our solution uses 802.21 communication messages to obtain information about foreign networks encountered before selecting the networks to connect to. Our evaluation through simulations, shows that network selection in heterogeneous wireless networks environment for the appropriately equipped devices is greatly enhanced by the use of the Media Independent Handover Protocol. In scenarios where the mobile node has no prior knowledge of the encountered different network architectures, the use of a Broker node can, for an optimal number of available networks also greatly enhance the mobile node’s network selection by reducing the delay associated and the packet losses incurred

    Proxy SDN Controller for Wireless Networks

    Get PDF

    On secure communication in integrated internet and heterogeneous multi-hop wireless networks.

    Get PDF
    Integration of the Internet with a Cellular Network, WMAN, WLAN, and MANET presents an exceptional promise by having co-existence of conventional WWANs/WMANs/WLANs with wireless ad hoc networks to provide ubiquitous communication. We call such integrated networks providing internet accessibility for mobile users as heterogeneous multi-hop wireless networks where the Internet and wireless infrastructure such as WLAN access points (APs) and base stations (BSs) constitute the backbone for various emerging wireless networks (e.g., multi-hop WLAN and ad hoc networks. Earlier approaches for the Internet connectivity either provide only unidirectional connectivity for ad hoc hosts or cause high overhead as well as delay for providing full bi-directional connections. In this dissertation, a new protocol is proposed for integrated Internet and ad hoc networks for supporting bi-directional global connectivity for ad hoc hosts. In order to provide efficient mobility management for mobile users in an integrated network, a mobility management protocol called multi-hop cellular IP (MCIP) has been proposed to provide a micro-mobility management framework for heterogeneous multi-hop network. The micro-mobility is achieved by differentiating the local domain from the global domain. At the same time, the MCIP protocol extends Mobile IP protocol for providing macro-mobility support between local domains either for single hop MSs or multi-hop MSs. In the MCIP protocol, new location and mobility management approaches are developed for tracking mobile stations, paging, and handoff management. This dissertation also provides a security protocol for integrated Internet and MANET to establish distributed trust relationships amongst mobile infrastructures. This protocol protects communication between two mobile stations against the attacks either from the Internet side or from wireless side. Moreover, a secure macro/micro-mobility protocol (SM3P) have been introduced and evaluated for preventing mobility-related attacks either for single-hop MSs or multi-hop MSs. In the proposed SM3P, mobile IP security has been extended for supporting macro-mobility across local domains through the process of multi-hop registration and authentication. In a local domain, a certificate-based authentication achieves the effective routing and micro-mobility protection from a range of potential security threats
    • …
    corecore