12,805 research outputs found
Tactical communication systems based on civil standards: Modeling in the MiXiM framework
In this paper, new work is presented belonging to an ongoing study, which
evaluates civil communication standards as potential candidates for the future
military Wide Band Waveforms (WBWFs). After an evaluation process of possible
candidates presented in [2], the selection process in [1] showed that the IEEE
802.11n OFDM could be a possible military WBWF candidate, but it should be
further investigated first in order to enhance or even replace critical
modules. According to this, some critical modules of the physical layer has
been further analyzed in [3] regarding the susceptibility of the OFDM signal
under jammer influences. However, the critical modules of the MAC layer (e.g.,
probabilistic medium access CSMA/CA) have not been analysed. In fact, it was
only suggested in [2] to replace this medium access by the better suited
Unified Slot Allocation Protocol - Multiple Access (USAP-MA) [4]. In this
regard, the present contribution describes the design paradigms of the new MAC
layer and explains how the proposed WBWF candidate has been modelled within the
MiXiM Framework of the OMNeT++ simulator.Comment: Published in: A. F\"orster, C. Sommer, T. Steinbach, M. W\"ahlisch
(Eds.), Proc. of 1st OMNeT++ Community Summit, Hamburg, Germany, September 2,
2014, arXiv:1409.0093, 201
Airborne Directional Networking: Topology Control Protocol Design
This research identifies and evaluates the impact of several architectural design choices in relation to airborne networking in contested environments related to autonomous topology control. Using simulation, we evaluate topology reconfiguration effectiveness using classical performance metrics for different point-to-point communication architectures. Our attention is focused on the design choices which have the greatest impact on reliability, scalability, and performance. In this work, we discuss the impact of several practical considerations of airborne networking in contested environments related to autonomous topology control modeling. Using simulation, we derive multiple classical performance metrics to evaluate topology reconfiguration effectiveness for different point-to-point communication architecture attributes for the purpose of qualifying protocol design elements
Directions of Mobile Ad Hoc Networks efficiency increase
The directions of efficiency increase of the self-organizing wireless networks MANET are proposed. They consist in the implementation of new methods and radio network management functions, coordination and intellectualization of the methods, corresponding to different OSI-model levels, and also coordination of the network resource management purposes distribution
Geographic Centroid Routing for Vehicular Networks
A number of geolocation-based Delay Tolerant Networking (DTN) routing
protocols have been shown to perform well in selected simulation and mobility
scenarios. However, the suitability of these mechanisms for vehicular networks
utilizing widely-available inexpensive Global Positioning System (GPS) hardware
has not been evaluated. We propose a novel geolocation-based routing primitive
(Centroid Routing) that is resilient to the measurement errors commonly present
in low-cost GPS devices. Using this notion of Centroids, we construct two novel
routing protocols and evaluate their performance with respect to positional
errors as well as traditional DTN routing metrics. We show that they outperform
existing approaches by a significant margin.Comment: 6 page
Spectrum sharing security and attacks in CRNs: a review
Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundament al approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of
the common control channel, more attention is paid to the
security of the common control channel by looking into its
security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR - specific security mechanisms are presented with some open research issues and challenges
Optimal Real-time Spectrum Sharing between Cooperative Relay and Ad-hoc Networks
Optimization based spectrum sharing strategies have been widely studied.
However, these strategies usually require a great amount of real-time
computation and significant signaling delay, and thus are hard to be fulfilled
in practical scenarios. This paper investigates optimal real-time spectrum
sharing between a cooperative relay network (CRN) and a nearby ad-hoc network.
Specifically, we optimize the spectrum access and resource allocation
strategies of the CRN so that the average traffic collision time between the
two networks can be minimized while maintaining a required throughput for the
CRN. The development is first for a frame-level setting, and then is extended
to an ergodic setting. For the latter setting, we propose an appealing optimal
real-time spectrum sharing strategy via Lagrangian dual optimization. The
proposed method only involves a small amount of real-time computation and
negligible control delay, and thus is suitable for practical implementations.
Simulation results are presented to demonstrate the efficiency of the proposed
strategies.Comment: One typo in the caption of Figure 5 is correcte
Empirical exploration of air traffic and human dynamics in terminal airspaces
Air traffic is widely known as a complex, task-critical techno-social system,
with numerous interactions between airspace, procedures, aircraft and air
traffic controllers. In order to develop and deploy high-level operational
concepts and automation systems scientifically and effectively, it is essential
to conduct an in-depth investigation on the intrinsic traffic-human dynamics
and characteristics, which is not widely seen in the literature. To fill this
gap, we propose a multi-layer network to model and analyze air traffic systems.
A Route-based Airspace Network (RAN) and Flight Trajectory Network (FTN)
encapsulate critical physical and operational characteristics; an Integrated
Flow-Driven Network (IFDN) and Interrelated Conflict-Communication Network
(ICCN) are formulated to represent air traffic flow transmissions and
intervention from air traffic controllers, respectively. Furthermore, a set of
analytical metrics including network variables, complex network attributes,
controllers' cognitive complexity, and chaotic metrics are introduced and
applied in a case study of Guangzhou terminal airspace. Empirical results show
the existence of fundamental diagram and macroscopic fundamental diagram at the
route, sector and terminal levels. Moreover, the dynamics and underlying
mechanisms of "ATCOs-flow" interactions are revealed and interpreted by
adaptive meta-cognition strategies based on network analysis of the ICCN.
Finally, at the system level, chaos is identified in conflict system and human
behavioral system when traffic switch to the semi-stable or congested phase.
This study offers analytical tools for understanding the complex human-flow
interactions at potentially a broad range of air traffic systems, and underpins
future developments and automation of intelligent air traffic management
systems.Comment: 30 pages, 28 figures, currently under revie
- β¦