1,982 research outputs found

    Impact of Docker Container Virtualization On Wireless Mesh Network by Using Software-Defined Network

    Get PDF
    In today’s advanced digital world era, it is extremely difficult for small enterprises or organizations to merge traditional or legacy computer network devices/equipment and wireless mesh networking devices with the latest digital computer network technology with respect to the expense of buying and maintaining expensive branded networking devices. However, today, by applying the neatly Software-defined networking, the OpenFlow protocol along with virtualization such as docker containers, which is a pack of their specific libraries, configured files, and software, provides advantages over proprietary or branded computer networking devices with respect to purchasing expenditure, operational expenditure, and improved performance in computer networking. Redistribution of routing protocol is very essential when using various autonomous systems in wireless mesh networks. Docker containers of frr and quagga give an edge over traditional or branded physical router devices, some docker containers are used as wired and wireless hosts/clients in the wireless mesh network. The novel idea used in this paper is on how to use the different software-defined controllers (Ryu and Pox controller) in a docker containerized wireless mesh network to analyse with respect to packet transfer, jitter in transmission, minimum delay in transmission, maximum delay in transmission, the average delay in transmission,  delay standard deviation bit-rate, send packets,  average packets drop, dropped packets along-with average loss-burst size in Mininet Wi-Fi testbed at the different scenario and the result shows that by using the docker container virtualization along with software-defined network two different controllers improves the performance and optimize the wireless mesh network. In addition, it shows that by using containerization and virtualization, capital expenditure and operational expenditure can be reduced in designing and developing wireless mesh network topologies.&nbsp

    EASND: Energy Adaptive Secure Neighbour Discovery Scheme for Wireless Sensor Networks

    Get PDF
    Wireless Sensor Network (WSN) is defined as a distributed system of networking, which is enabled with set of resource constrained sensors, thus attempt to providing a large set of capabilities and connectivity interferences. After deployment nodes in the network must automatically affected heterogeneity of framework and design framework steps, including obtaining knowledge of neighbor nodes for relaying information. The primary goal of the neighbor discovery process is reducing power consumption and enhancing the lifespan of sensor devices. The sensor devices incorporate with advanced multi-purpose protocols, and specifically communication models with the pre-eminent objective of WSN applications. This paper introduces the power and security aware neighbor discovery for WSNs in symmetric and asymmetric scenarios. We have used different of neighbor discovery protocols and security models to make the network as a realistic application dependent model. Finally, we conduct simulation to analyze the performance of the proposed EASND in terms of energy efficiency, collisions, and security. The node channel utilization is exceptionally elevated, and the energy consumption to the discovery of neighbor nodes will also be significantly minimized. Experimental results show that the proposed model has valid accomplishment

    Misbehavior aware on-demand intrusion detection system to enhance security in VANETs with efficient rogue nodes detection and prevention techniques

    Get PDF
    Vehicular ad-hoc networks (VANETs) facilitate vehicles to broadcast beacon messages to ensure road safety. The goal behind sharing the information through beacon messages is to disseminate network state or emergency information. The exchange of information is susceptible to security attacks of different kinds. Amongst various problems to be solved in VANETs is the issue of rogue nodes and their impact on the network. Rogue nodes are malicious vehicles that are vicious to cause severe damage to the network by modifying or altering false data in beacon messages that could lead to catastrophic consequences like trapping a group of vehicles, road accidents, vehicle collisions, etc. This thesis discusses the problems associated with the security VANETs in the presence of rogue nodes. We proposed three novel intrusion detection frameworks to detect the rogue nodes responsible for false information, Sybil, and platoon control maneuver attacks only by analyzing and comparing the beacon messages broadcast over the network. The novelty of our frameworks lies in containing network damage and securing VANETs from the harmful impact of rogue nodes. The proposed frameworks are simulated using SUMO, OMNET++, and VENTOS, and the results obtained have been presented, discussed, and compared to existing frameworks. Results show that the developed methods improve the systems’ performance compared to existing methods even when the number of rogue nodes increases in the region

    Efficient Security Protocols for Constrained Devices

    Get PDF
    During the last decades, more and more devices have been connected to the Internet.Today, there are more devices connected to the Internet than humans.An increasingly more common type of devices are cyber-physical devices.A device that interacts with its environment is called a cyber-physical device.Sensors that measure their environment and actuators that alter the physical environment are both cyber-physical devices.Devices connected to the Internet risk being compromised by threat actors such as hackers.Cyber-physical devices have become a preferred target for threat actors since the consequence of an intrusion disrupting or destroying a cyber-physical system can be severe.Cyber attacks against power and energy infrastructure have caused significant disruptions in recent years.Many cyber-physical devices are categorized as constrained devices.A constrained device is characterized by one or more of the following limitations: limited memory, a less powerful CPU, or a limited communication interface.Many constrained devices are also powered by a battery or energy harvesting, which limits the available energy budget.Devices must be efficient to make the most of the limited resources.Mitigating cyber attacks is a complex task, requiring technical and organizational measures.Constrained cyber-physical devices require efficient security mechanisms to avoid overloading the systems limited resources.In this thesis, we present research on efficient security protocols for constrained cyber-physical devices.We have implemented and evaluated two state-of-the-art protocols, OSCORE and Group OSCORE.These protocols allow end-to-end protection of CoAP messages in the presence of untrusted proxies.Next, we have performed a formal protocol verification of WirelessHART, a protocol for communications in an industrial control systems setting.In our work, we present a novel attack against the protocol.We have developed a novel architecture for industrial control systems utilizing the Digital Twin concept.Using a state synchronization protocol, we propagate state changes between the digital and physical twins.The Digital Twin can then monitor and manage devices.We have also designed a protocol for secure ownership transfer of constrained wireless devices. Our protocol allows the owner of a wireless sensor network to transfer control of the devices to a new owner.With a formal protocol verification, we can guarantee the security of both the old and new owners.Lastly, we have developed an efficient Private Stream Aggregation (PSA) protocol.PSA allows devices to send encrypted measurements to an aggregator.The aggregator can combine the encrypted measurements and calculate the decrypted sum of the measurements.No party will learn the measurement except the device that generated it

    Predicting and Recovering Link Failure Localization Using Competitive Swarm Optimization for DSR Protocol in MANET

    Get PDF
    Portable impromptu organization is a self-putting together, major construction-less, independent remote versatile hub that exists without even a trace of a determined base station or government association. MANET requires no extraordinary foundation as the organization is unique. Multicasting is an urgent issue in correspondence organizations. Multicast is one of the effective methods in MANET. In multicasting, information parcels from one hub are communicated to a bunch of recipient hubs all at once, at a similar time. In this research work, Failure Node Detection and Efficient Node Localization in a MANET situation are proposed. Localization in MANET is a main area that attracts significant research interest. Localization is a method to determine the nodes’ location in the communication network. A novel routing algorithm, which is used for Predicting and Recovering Link Failure Localization using a Genetic Algorithm with Competitive Swarm Optimization (PRLFL-GACSO) Algorithm is proposed in this study to calculate and recover link failure in MANET. The process of link failure detection is accomplished using mathematical modelling of the genetic algorithm and the routing is attained using the Competitive Swarm optimization technique. The result proposed MANET method makes use of the CSO algorithm, which facilitates a well-organized packet transfer from the source node to the destination node and enhances DSR routing performance. Based on node movement, link value, and endwise delay, the optimal route is found. The main benefit of the PRLFL-GACSO Algorithm is it achieves multiple optimal solutions over global information. Further, premature convergence is avoided using Competitive Swarm Optimization (CSO). The suggested work is measured based on the Ns simulator. The presentation metrix are PDR, endwise delay, power consumption, hit ratio, etc. The presentation of the proposed method is almost 4% and 5% greater than the present TEA-MDRP, RSTA-AOMDV, and RMQS-ua methods. After, the suggested method attains greater performance for detecting and recovering link failure. In future work, the hybrid multiway routing protocols are presented to provide link failure and route breakages and liability tolerance at the time of node failure, and it also increases the worth of service aspects, respectively

    Computational efficiency maximization for UAV-assisted MEC network with energy harvesting in disaster scenarios

    Get PDF
    Wireless networks are expected to provide unlimited connectivity to an increasing number of heterogeneous devices. Future wireless networks (sixth-generation (6G)) will accomplish this in three-dimensional (3D) space by combining terrestrial and aerial networks. However, effective resource optimization and standardization in future wireless networks are challenging because of massive resource-constrained devices, diverse quality-of-service (QoS) requirements, and a high density of heterogeneous devices. Recently, unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) networks are considered a potential candidate to provide effective and efficient solutions for disaster management in terms of disaster monitoring, forecasting, in-time response, and situation awareness. However, the limited size of end-user devices comes with the limitation of battery lives and computational capacities. Therefore, offloading, energy consumption and computational efficiency are significant challenges for uninterrupted communication in UAV-assisted MEC networks. In this thesis, we consider a UAV-assisted MEC network with energy harvesting (EH). To achieve this, we mathematically formulate a mixed integer non-linear programming problem to maximize the computational efficiency of UAV-assisted MEC networks with EH under disaster situations. A power splitting architecture splits the source power for communication and EH. We jointly optimize user association, the transmission power of UE, task offloading time, and UAV’s optimal location. To solve this optimization problem, we divide it into three stages. In the first stage, we adopt k-means clustering to determine the optimal locations of the UAVs. In the second stage, we determine user association. In the third stage, we determine the optimal power of UE and offloading time using the optimal UAV location from the first stage and the user association indicator from the second stage, followed by linearization and the use of interior-point method to solve the resulting linear optimization problem. Simulation results for offloading, no-offloading, offloading with EH, and no-offloading no-EH scenarios are presented with a varying number of UAVs and UEs. The results show the proposed EH solution’s effectiveness in offloading scenarios compared to no-offloading scenarios in terms of computational efficiency, bits computed, and energy consumptio

    Optimal Unmanned Aerial Vehicle Control and Designs for Load Balancing in Intelligent Wireless Communication Systems

    Get PDF
    Maintaining reliable wireless connectivity is essential for the continuing growth of mobile devices and their massive access to the Internet of Things (IoT). However, terrestrial cellular networks often fail to meet their required quality of service (QoS) demand because of the limited spectrum capacity. Although the deployment of more base stations (BSs) in a concerned area is costly and requires regular maintenance. Alternatively, unmanned aerial vehicles (UAVs) could be a potential solution due to their ability of on-demand coverage and the high likelihood of strong line-of-sight (LoS) communication links. Therefore, this chapter focuses on a UAV’s deployment and movement design that supports existing BSs by reducing data traffic load and providing reliable wireless communication. Specifically, we design UAV’s deployment and trajectory under an efficient resource allocation strategy, i.e., assigning devices’ association indicators and transmitting power to maximize overall system’s throughput and minimize the total energy consumption of all devices. For these implementations, we adopt reinforcement learning framework because it does not require all information about the system environment. The proposed methodology finds optimal policy using the Markov decision process, exploiting the previous environment interactions. Our proposed technique significantly improves the system’s performance compared to the other benchmark schemes

    Statistical Performance Evaluation for Energy Harvesting Communications based on Large Deviation Theorem

    Get PDF
    Energy harvesting (EH) is a promising technology for enhancing a network’s quality of service (QoS). EH-based communication systems are studied by tackling the challenges of energy-outage probability and energy conditioning. These issues motivate this research to develop new solutions for increasing the lifetime of device batteries by leveraging renewable energy sources available in the surrounding environment, for instance, from solar and radio-frequency (RF) energy through harvesting. This dissertation studies an energy outage problem and user QoS requirements for energy harvesting communications. In the first part of this dissertation, the performance of an energy harvesting communication link is analysed by allowing a certain level of energy-outage. In EH systems, energy consumed from the battery depends on the QoS required by the end user and on the channel state information. At the same time, the energy arrival to the battery depends on the strength of the power source, solar in this case, and is independent of the fading channel conditions and the required QoS. Due to the independence between the energy arrival into the battery and the energy consumed from there, it is challenging to estimate the exact status of the available energy in the battery. An energy outage is experienced when there is no further energy for the system to utilise for data transmission. In this part, a thorough study was carried out to analyse the required energy harvesting (EH) rate for satisfying the QoS requirements when a level of energy-outage is allowed in a point-to-point EH-based communication system equipped with a finite-sized battery. Furthermore, an expression relating the rate of the incoming energy with the fading channel conditions and the minimum required QoS of the system was provided to analyse the performance of the EH-based communication system under energy constraints. Finally, numerical results confirm the proposed mechanism’s analytical findings and correctness. In the second part of this dissertation, the performance of point-to-point communications is investigated in which the source node can harvest and store energy from RF signals and then use the harvested energy to communicate with its end destination. The continuous availability of RF energy has proved advantageous as a wireless power source to support low-power devices, making RF-based energy harvesting an alternative and viable solution for powering next-generation wireless networks, particularly for Internet-of-Things (IoT) applications. Specifically, the point-to-point RF-based energy-harvesting communication is considered, where the transmitter, which can be an IoT sensor, implements a time-switching protocol between the energy harvesting and the information transfer, and we focus on analysing the system performance while aiming to guarantee the required QoS of the end user subject to system constraint energy outage. The time-switching circuit at the source node allows the latter to switch between harvesting energy from a distant RF energy source and transmitting data to its target destination using the scavenged energy. Using a duality principle between the physical energy queue and a proposed virtual energy queue and assuming that a certain level of energy outage can be tolerated in the communication process, the system performance was evaluated with a novel analytical framework that leverages tools for the large deviation principle. In the third and last part of this dissertation, an empirical study of the RF-EH model is presented for ensuring the QoS constraints during an energy-outage for Simultaneous Wireless Information and Power Transfer (SWIPT) network. We consider a relay network over a Rayleigh fading channel where the relay lacks a permanent power source. Thus, we obtain energy from wireless energy harvesting (EH) of the source’s signals to maintain operation. This process is performed using a time-switching protocol at the relay for enhancing the quality of service (QoS) in SWIPT networks. A numerical approach is incorporated to evaluate the performance of the proposed RF-EH model in terms of different evaluation parameters such as time-switching protocol, transmit power and outage. The assumptions of the large deviation principle are satisfied using a proposed virtual energy queuing model, which is then used for the performance analysis. We established a closed-form expression for the system’s probability of experiencing an energy outage and the energy consumed by the relay battery

    On the Road to 6G: Visions, Requirements, Key Technologies and Testbeds

    Get PDF
    Fifth generation (5G) mobile communication systems have entered the stage of commercial development, providing users with new services and improved user experiences as well as offering a host of novel opportunities to various industries. However, 5G still faces many challenges. To address these challenges, international industrial, academic, and standards organizations have commenced research on sixth generation (6G) wireless communication systems. A series of white papers and survey papers have been published, which aim to define 6G in terms of requirements, application scenarios, key technologies, etc. Although ITU-R has been working on the 6G vision and it is expected to reach a consensus on what 6G will be by mid-2023, the related global discussions are still wide open and the existing literature has identified numerous open issues. This paper first provides a comprehensive portrayal of the 6G vision, technical requirements, and application scenarios, covering the current common understanding of 6G. Then, a critical appraisal of the 6G network architecture and key technologies is presented. Furthermore, existing testbeds and advanced 6G verification platforms are detailed for the first time. In addition, future research directions and open challenges are identified for stimulating the on-going global debate. Finally, lessons learned to date concerning 6G networks are discussed
    • …
    corecore