609 research outputs found
Research on Wireless Multi-hop Networks: Current State and Challenges
Wireless multi-hop networks, in various forms and under various names, are
being increasingly used in military and civilian applications. Studying
connectivity and capacity of these networks is an important problem. The
scaling behavior of connectivity and capacity when the network becomes
sufficiently large is of particular interest. In this position paper, we
briefly overview recent development and discuss research challenges and
opportunities in the area, with a focus on the network connectivity.Comment: invited position paper to International Conference on Computing,
Networking and Communications, Hawaii, USA, 201
Connection Between System Parameters and Localization Probability in Network of Randomly Distributed Nodes
This article deals with localization probability in a network of randomly
distributed communication nodes contained in a bounded domain. A fraction of
the nodes denoted as L-nodes are assumed to have localization information while
the rest of the nodes denoted as NL nodes do not. The basic model assumes each
node has a certain radio coverage within which it can make relative distance
measurements. We model both the case radio coverage is fixed and the case radio
coverage is determined by signal strength measurements in a Log-Normal
Shadowing environment. We apply the probabilistic method to determine the
probability of NL-node localization as a function of the coverage area to
domain area ratio and the density of L-nodes. We establish analytical
expressions for this probability and the transition thresholds with respect to
key parameters whereby marked change in the probability behavior is observed.
The theoretical results presented in the article are supported by simulations.Comment: To appear on IEEE Transactions on Wireless Communications, November
200
Wireless Secrecy in Large-Scale Networks
The ability to exchange secret information is critical to many commercial,
governmental, and military networks. The intrinsically secure communications
graph (iS-graph) is a random graph which describes the connections that can be
securely established over a large-scale network, by exploiting the physical
properties of the wireless medium. This paper provides an overview of the main
properties of this new class of random graphs. We first analyze the local
properties of the iS-graph, namely the degree distributions and their
dependence on fading, target secrecy rate, and eavesdropper collusion. To
mitigate the effect of the eavesdroppers, we propose two techniques that
improve secure connectivity. Then, we analyze the global properties of the
iS-graph, namely percolation on the infinite plane, and full connectivity on a
finite region. These results help clarify how the presence of eavesdroppers can
compromise secure communication in a large-scale network.Comment: To appear: Proc. IEEE Information Theory and Applications Workshop
(ITA'11), San Diego, CA, Feb. 2011, pp. 1-10, Invited Pape
Critical Density for Connectivity in 2D and 3D Wireless Multi-Hop Networks
In this paper we investigate the critical node density required to ensure that an arbitrary node in a large-scale wireless multi-hop network is connected (via multi-hop path) to infinitely many other nodes with a positive probability. Specifically we con
Connectivity, Coverage and Placement in Wireless Sensor Networks
Wireless communication between sensors allows the formation of flexible sensor networks, which can be deployed rapidly over wide or inaccessible areas. However, the need to gather data from all sensors in the network imposes constraints on the distances between sensors. This survey describes the state of the art in techniques for determining the minimum density and optimal locations of relay nodes and ordinary sensors to ensure connectivity, subject to various degrees of uncertainty in the locations of the nodes
- …