861 research outputs found
Combinatorial Channel Signature Modulation for Wireless ad-hoc Networks
In this paper we introduce a novel modulation and multiplexing method which
facilitates highly efficient and simultaneous communication between multiple
terminals in wireless ad-hoc networks. We term this method Combinatorial
Channel Signature Modulation (CCSM). The CCSM method is particularly efficient
in situations where communicating nodes operate in highly time dispersive
environments. This is all achieved with a minimal MAC layer overhead, since all
users are allowed to transmit and receive at the same time/frequency (full
simultaneous duplex). The CCSM method has its roots in sparse modelling and the
receiver is based on compressive sampling techniques. Towards this end, we
develop a new low complexity algorithm termed Group Subspace Pursuit. Our
analysis suggests that CCSM at least doubles the throughput when compared to
the state-of-the art.Comment: 6 pages, 7 figures, to appear in IEEE International Conference on
Communications ICC 201
A Survey on Wireless Sensor Network Security
Wireless sensor networks (WSNs) have recently attracted a lot of interest in
the research community due their wide range of applications. Due to distributed
nature of these networks and their deployment in remote areas, these networks
are vulnerable to numerous security threats that can adversely affect their
proper functioning. This problem is more critical if the network is deployed
for some mission-critical applications such as in a tactical battlefield.
Random failure of nodes is also very likely in real-life deployment scenarios.
Due to resource constraints in the sensor nodes, traditional security
mechanisms with large overhead of computation and communication are infeasible
in WSNs. Security in sensor networks is, therefore, a particularly challenging
task. This paper discusses the current state of the art in security mechanisms
for WSNs. Various types of attacks are discussed and their countermeasures
presented. A brief discussion on the future direction of research in WSN
security is also included.Comment: 24 pages, 4 figures, 2 table
Mobile Ad-Hoc Networks
Being infrastructure-less and without central administration control, wireless ad-hoc networking is playing a more and more important role in extending the coverage of traditional wireless infrastructure (cellular networks, wireless LAN, etc). This book includes state-of the-art techniques and solutions for wireless ad-hoc networks. It focuses on the following topics in ad-hoc networks: vehicular ad-hoc networks, security and caching, TCP in ad-hoc networks and emerging applications. It is targeted to provide network engineers and researchers with design guidelines for large scale wireless ad hoc networks
- …