1,453 research outputs found
Context Information for Fast Cell Discovery in mm-wave 5G Networks
The exploitation of the mm-wave bands is one of the most promising solutions
for 5G mobile radio networks. However, the use of mm-wave technologies in
cellular networks is not straightforward due to mm-wave harsh propagation
conditions that limit access availability. In order to overcome this obstacle,
hybrid network architectures are being considered where mm-wave small cells can
exploit an overlay coverage layer based on legacy technology. The additional
mm-wave layer can also take advantage of a functional split between control and
user plane, that allows to delegate most of the signaling functions to legacy
base stations and to gather context information from users for resource
optimization. However, mm-wave technology requires high gain antenna systems to
compensate for high path loss and limited power, e.g., through the use of
multiple antennas for high directivity. Directional transmissions must be also
used for the cell discovery and synchronization process, and this can lead to a
non-negligible delay due to the need to scan the cell area with multiple
transmissions at different directions. In this paper, we propose to exploit the
context information related to user position, provided by the separated control
plane, to improve the cell discovery procedure and minimize delay. We
investigate the fundamental trade-offs of the cell discovery process with
directional antennas and the effects of the context information accuracy on its
performance. Numerical results are provided to validate our observations.Comment: 6 pages, 8 figures, in Proceedings of European Wireless 201
Self-organization of Nodes using Bio-Inspired Techniques for Achieving Small World Properties
In an autonomous wireless sensor network, self-organization of the nodes is
essential to achieve network wide characteristics. We believe that connectivity
in wireless autonomous networks can be increased and overall average path
length can be reduced by using beamforming and bio-inspired algorithms. Recent
works on the use of beamforming in wireless networks mostly assume the
knowledge of the network in aggregation to either heterogeneous or hybrid
deployment. We propose that without the global knowledge or the introduction of
any special feature, the average path length can be reduced with the help of
inspirations from the nature and simple interactions between neighboring nodes.
Our algorithm also reduces the number of disconnected components within the
network. Our results show that reduction in the average path length and the
number of disconnected components can be achieved using very simple local rules
and without the full network knowledge.Comment: Accepted to Joint workshop on complex networks and pervasive group
communication (CCNet/PerGroup), in conjunction with IEEE Globecom 201
A Self-Organization Framework for Wireless Ad Hoc Networks as Small Worlds
Motivated by the benefits of small world networks, we propose a
self-organization framework for wireless ad hoc networks. We investigate the
use of directional beamforming for creating long-range short cuts between
nodes. Using simulation results for randomized beamforming as a guideline, we
identify crucial design issues for algorithm design. Our results show that,
while significant path length reduction is achievable, this is accompanied by
the problem of asymmetric paths between nodes. Subsequently, we propose a
distributed algorithm for small world creation that achieves path length
reduction while maintaining connectivity. We define a new centrality measure
that estimates the structural importance of nodes based on traffic flow in the
network, which is used to identify the optimum nodes for beamforming. We show,
using simulations, that this leads to significant reduction in path length
while maintaining connectivity.Comment: Submitted to IEEE Transactions on Vehicular Technolog
Resilient networking in wireless sensor networks
This report deals with security in wireless sensor networks (WSNs),
especially in network layer. Multiple secure routing protocols have been
proposed in the literature. However, they often use the cryptography to secure
routing functionalities. The cryptography alone is not enough to defend against
multiple attacks due to the node compromise. Therefore, we need more
algorithmic solutions. In this report, we focus on the behavior of routing
protocols to determine which properties make them more resilient to attacks.
Our aim is to find some answers to the following questions. Are there any
existing protocols, not designed initially for security, but which already
contain some inherently resilient properties against attacks under which some
portion of the network nodes is compromised? If yes, which specific behaviors
are making these protocols more resilient? We propose in this report an
overview of security strategies for WSNs in general, including existing attacks
and defensive measures. In this report we focus at the network layer in
particular, and an analysis of the behavior of four particular routing
protocols is provided to determine their inherent resiliency to insider
attacks. The protocols considered are: Dynamic Source Routing (DSR),
Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing
(RWR)
- …