3,811 research outputs found

    Resilient networking in wireless sensor networks

    Get PDF
    This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In this report, we focus on the behavior of routing protocols to determine which properties make them more resilient to attacks. Our aim is to find some answers to the following questions. Are there any existing protocols, not designed initially for security, but which already contain some inherently resilient properties against attacks under which some portion of the network nodes is compromised? If yes, which specific behaviors are making these protocols more resilient? We propose in this report an overview of security strategies for WSNs in general, including existing attacks and defensive measures. In this report we focus at the network layer in particular, and an analysis of the behavior of four particular routing protocols is provided to determine their inherent resiliency to insider attacks. The protocols considered are: Dynamic Source Routing (DSR), Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing (RWR)

    Millimeter Wave Ad Hoc Networks: Noise-limited or Interference-limited?

    Full text link
    In millimeter wave (mmWave) communication systems, narrow beam operations overcome severe channel attenuations, reduce multiuser interference, and thus introduce the new concept of noise-limited mmWave wireless networks. The regime of the network, whether noise-limited or interference-limited, heavily reflects on the medium access control (MAC) layer throughput and on proper resource allocation and interference management strategies. Yet, alternating presence of these regimes and, more importantly, their dependence on the mmWave design parameters are ignored in the current approaches to mmWave MAC layer design, with the potential disastrous consequences on the throughput/delay performance. In this paper, tractable closed-form expressions for collision probability and MAC layer throughput of mmWave networks, operating under slotted ALOHA and TDMA, are derived. The new analysis reveals that mmWave networks may exhibit a non-negligible transitional behavior from a noise-limited regime to an interference-limited regime, depending on the density of the transmitters, density and size of obstacles, transmission probability, beamwidth, and transmit power. It is concluded that a new framework of adaptive hybrid resource allocation procedure, containing a proactive contention-based phase followed by a reactive contention-free one with dynamic phase durations, is necessary to cope with such transitional behavior.Comment: accepted in IEEE GLOBECOM'1

    Toward End-to-End, Full-Stack 6G Terahertz Networks

    Full text link
    Recent evolutions in semiconductors have brought the terahertz band in the spotlight as an enabler for terabit-per-second communications in 6G networks. Most of the research so far, however, has focused on understanding the physics of terahertz devices, circuitry and propagation, and on studying physical layer solutions. However, integrating this technology in complex mobile networks requires a proper design of the full communication stack, to address link- and system-level challenges related to network setup, management, coordination, energy efficiency, and end-to-end connectivity. This paper provides an overview of the issues that need to be overcome to introduce the terahertz spectrum in mobile networks, from a MAC, network and transport layer perspective, with considerations on the performance of end-to-end data flows on terahertz connections.Comment: Published on IEEE Communications Magazine, THz Communications: A Catalyst for the Wireless Future, 7 pages, 6 figure

    Fast Cell Discovery in mm-wave 5G Networks with Context Information

    Full text link
    The exploitation of mm-wave bands is one of the key-enabler for 5G mobile radio networks. However, the introduction of mm-wave technologies in cellular networks is not straightforward due to harsh propagation conditions that limit the mm-wave access availability. Mm-wave technologies require high-gain antenna systems to compensate for high path loss and limited power. As a consequence, directional transmissions must be used for cell discovery and synchronization processes: this can lead to a non-negligible access delay caused by the exploration of the cell area with multiple transmissions along different directions. The integration of mm-wave technologies and conventional wireless access networks with the objective of speeding up the cell search process requires new 5G network architectural solutions. Such architectures introduce a functional split between C-plane and U-plane, thereby guaranteeing the availability of a reliable signaling channel through conventional wireless technologies that provides the opportunity to collect useful context information from the network edge. In this article, we leverage the context information related to user positions to improve the directional cell discovery process. We investigate fundamental trade-offs of this process and the effects of the context information accuracy on the overall system performance. We also cope with obstacle obstructions in the cell area and propose an approach based on a geo-located context database where information gathered over time is stored to guide future searches. Analytic models and numerical results are provided to validate proposed strategies.Comment: 14 pages, submitted to IEEE Transaction on Mobile Computin
    • …
    corecore