3,811 research outputs found
Resilient networking in wireless sensor networks
This report deals with security in wireless sensor networks (WSNs),
especially in network layer. Multiple secure routing protocols have been
proposed in the literature. However, they often use the cryptography to secure
routing functionalities. The cryptography alone is not enough to defend against
multiple attacks due to the node compromise. Therefore, we need more
algorithmic solutions. In this report, we focus on the behavior of routing
protocols to determine which properties make them more resilient to attacks.
Our aim is to find some answers to the following questions. Are there any
existing protocols, not designed initially for security, but which already
contain some inherently resilient properties against attacks under which some
portion of the network nodes is compromised? If yes, which specific behaviors
are making these protocols more resilient? We propose in this report an
overview of security strategies for WSNs in general, including existing attacks
and defensive measures. In this report we focus at the network layer in
particular, and an analysis of the behavior of four particular routing
protocols is provided to determine their inherent resiliency to insider
attacks. The protocols considered are: Dynamic Source Routing (DSR),
Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing
(RWR)
Millimeter Wave Ad Hoc Networks: Noise-limited or Interference-limited?
In millimeter wave (mmWave) communication systems, narrow beam operations
overcome severe channel attenuations, reduce multiuser interference, and thus
introduce the new concept of noise-limited mmWave wireless networks. The regime
of the network, whether noise-limited or interference-limited, heavily reflects
on the medium access control (MAC) layer throughput and on proper resource
allocation and interference management strategies. Yet, alternating presence of
these regimes and, more importantly, their dependence on the mmWave design
parameters are ignored in the current approaches to mmWave MAC layer design,
with the potential disastrous consequences on the throughput/delay performance.
In this paper, tractable closed-form expressions for collision probability and
MAC layer throughput of mmWave networks, operating under slotted ALOHA and
TDMA, are derived. The new analysis reveals that mmWave networks may exhibit a
non-negligible transitional behavior from a noise-limited regime to an
interference-limited regime, depending on the density of the transmitters,
density and size of obstacles, transmission probability, beamwidth, and
transmit power. It is concluded that a new framework of adaptive hybrid
resource allocation procedure, containing a proactive contention-based phase
followed by a reactive contention-free one with dynamic phase durations, is
necessary to cope with such transitional behavior.Comment: accepted in IEEE GLOBECOM'1
Toward End-to-End, Full-Stack 6G Terahertz Networks
Recent evolutions in semiconductors have brought the terahertz band in the
spotlight as an enabler for terabit-per-second communications in 6G networks.
Most of the research so far, however, has focused on understanding the physics
of terahertz devices, circuitry and propagation, and on studying physical layer
solutions. However, integrating this technology in complex mobile networks
requires a proper design of the full communication stack, to address link- and
system-level challenges related to network setup, management, coordination,
energy efficiency, and end-to-end connectivity. This paper provides an overview
of the issues that need to be overcome to introduce the terahertz spectrum in
mobile networks, from a MAC, network and transport layer perspective, with
considerations on the performance of end-to-end data flows on terahertz
connections.Comment: Published on IEEE Communications Magazine, THz Communications: A
Catalyst for the Wireless Future, 7 pages, 6 figure
Fast Cell Discovery in mm-wave 5G Networks with Context Information
The exploitation of mm-wave bands is one of the key-enabler for 5G mobile
radio networks. However, the introduction of mm-wave technologies in cellular
networks is not straightforward due to harsh propagation conditions that limit
the mm-wave access availability. Mm-wave technologies require high-gain antenna
systems to compensate for high path loss and limited power. As a consequence,
directional transmissions must be used for cell discovery and synchronization
processes: this can lead to a non-negligible access delay caused by the
exploration of the cell area with multiple transmissions along different
directions.
The integration of mm-wave technologies and conventional wireless access
networks with the objective of speeding up the cell search process requires new
5G network architectural solutions. Such architectures introduce a functional
split between C-plane and U-plane, thereby guaranteeing the availability of a
reliable signaling channel through conventional wireless technologies that
provides the opportunity to collect useful context information from the network
edge.
In this article, we leverage the context information related to user
positions to improve the directional cell discovery process. We investigate
fundamental trade-offs of this process and the effects of the context
information accuracy on the overall system performance. We also cope with
obstacle obstructions in the cell area and propose an approach based on a
geo-located context database where information gathered over time is stored to
guide future searches. Analytic models and numerical results are provided to
validate proposed strategies.Comment: 14 pages, submitted to IEEE Transaction on Mobile Computin
- …