5,129 research outputs found
Throughput Analysis of Primary and Secondary Networks in a Shared IEEE 802.11 System
In this paper, we analyze the coexistence of a primary and a secondary
(cognitive) network when both networks use the IEEE 802.11 based distributed
coordination function for medium access control. Specifically, we consider the
problem of channel capture by a secondary network that uses spectrum sensing to
determine the availability of the channel, and its impact on the primary
throughput. We integrate the notion of transmission slots in Bianchi's Markov
model with the physical time slots, to derive the transmission probability of
the secondary network as a function of its scan duration. This is used to
obtain analytical expressions for the throughput achievable by the primary and
secondary networks. Our analysis considers both saturated and unsaturated
networks. By performing a numerical search, the secondary network parameters
are selected to maximize its throughput for a given level of protection of the
primary network throughput. The theoretical expressions are validated using
extensive simulations carried out in the Network Simulator 2. Our results
provide critical insights into the performance and robustness of different
schemes for medium access by the secondary network. In particular, we find that
the channel captures by the secondary network does not significantly impact the
primary throughput, and that simply increasing the secondary contention window
size is only marginally inferior to silent-period based methods in terms of its
throughput performance.Comment: To appear in IEEE Transactions on Wireless Communication
A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Network
A Wireless Body Area Network (WBAN) is a collection of low-power and
lightweight wireless sensor nodes that are used to monitor the human body
functions and the surrounding environment. It supports a number of innovative
and interesting applications, including ubiquitous healthcare and Consumer
Electronics (CE) applications. Since WBAN nodes are used to collect sensitive
(life-critical) information and may operate in hostile environments, they
require strict security mechanisms to prevent malicious interaction with the
system. In this paper, we first highlight major security requirements and
Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control
(MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4
security framework and identify the security vulnerabilities and major attacks
in the context of WBAN. Different types of attacks on the Contention Access
Period (CAP) and Contention Free Period (CFP) parts of the superframe are
analyzed and discussed. It is observed that a smart attacker can successfully
corrupt an increasing number of GTS slots in the CFP period and can
considerably affect the Quality of Service (QoS) in WBAN (since most of the
data is carried in CFP period). As we increase the number of smart attackers
the corrupted GTS slots are eventually increased, which prevents the legitimate
nodes to utilize the bandwidth efficiently. This means that the direct
adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure
for certain WBAN applications. New solutions are required to integrate high
level security in WBAN.Comment: 14 pages, 7 figures, 2 table
On the Impact of Wireless Jamming on the Distributed Secondary Microgrid Control
The secondary control in direct current microgrids (MGs) is used to restore
the voltage deviations caused by the primary droop control, where the latter is
implemented locally in each distributed generator and reacts to load
variations. Numerous recent works propose to implement the secondary control in
a distributed fashion, relying on a communication system to achieve consensus
among MG units. This paper shows that, if the system is not designed to cope
with adversary communication impairments, then a malicious attacker can apply a
simple jamming of a few units of the MG and thus compromise the secondary MG
control. Compared to other denial-of-service attacks that are oriented against
the tertiary control, such as economic dispatch, the attack on the secondary
control presented here can be more severe, as it disrupts the basic
functionality of the MG
STiCMAC: A MAC Protocol for Robust Space-Time Coding in Cooperative Wireless LANs
Relay-assisted cooperative wireless communication has been shown to have
significant performance gains over the legacy direct transmission scheme.
Compared with single relay based cooperation schemes, utilizing multiple relays
further improves the reliability and rate of transmissions. Distributed
space-time coding (DSTC), as one of the schemes to utilize multiple relays,
requires tight coordination between relays and does not perform well in a
distributed environment with mobility. In this paper, a cooperative medium
access control (MAC) layer protocol, called \emph{STiCMAC}, is designed to
allow multiple relays to transmit at the same time in an IEEE 802.11 network.
The transmission is based on a novel DSTC scheme called \emph{randomized
distributed space-time coding} (\emph{R-DSTC}), which requires minimum
coordination. Unlike conventional cooperation schemes that pick nodes with good
links, \emph{STiCMAC} picks a \emph{transmission mode} that could most improve
the end-to-end data rate. Any station that correctly receives from the source
can act as a relay and participate in forwarding. The MAC protocol is
implemented in a fully decentralized manner and is able to opportunistically
recruit relays on the fly, thus making it \emph{robust} to channel variations
and user mobility. Simulation results show that the network capacity and delay
performance are greatly improved, especially in a mobile environment.Comment: This paper is a revised version of a paper with the same name
submitted to IEEE Transaction on Wireless Communications. STiCMAC protocol
with RTS/CTS turned off is presented in the appendix of this draf
Distributed MAC Protocol Supporting Physical-Layer Network Coding
Physical-layer network coding (PNC) is a promising approach for wireless
networks. It allows nodes to transmit simultaneously. Due to the difficulties
of scheduling simultaneous transmissions, existing works on PNC are based on
simplified medium access control (MAC) protocols, which are not applicable to
general multi-hop wireless networks, to the best of our knowledge. In this
paper, we propose a distributed MAC protocol that supports PNC in multi-hop
wireless networks. The proposed MAC protocol is based on the carrier sense
multiple access (CSMA) strategy and can be regarded as an extension to the IEEE
802.11 MAC protocol. In the proposed protocol, each node collects information
on the queue status of its neighboring nodes. When a node finds that there is
an opportunity for some of its neighbors to perform PNC, it notifies its
corresponding neighboring nodes and initiates the process of packet exchange
using PNC, with the node itself as a relay. During the packet exchange process,
the relay also works as a coordinator which coordinates the transmission of
source nodes. Meanwhile, the proposed protocol is compatible with conventional
network coding and conventional transmission schemes. Simulation results show
that the proposed protocol is advantageous in various scenarios of wireless
applications.Comment: Final versio
- …