484 research outputs found

    Noisy Beeping Networks

    Full text link
    We introduce noisy beeping networks, where nodes have limited communication capabilities, namely, they can only emit energy or sense the channel for energy. Furthermore, imperfections may cause devices to malfunction with some fixed probability when sensing the channel, which amounts to deducing a noisy received transmission. Such noisy networks have implications for ultra-lightweight sensor networks and biological systems. We show how to compute tasks in a noise-resilient manner over noisy beeping networks of arbitrary structure. In particular, we transform any algorithm that assumes a noiseless beeping network (of size nn) into a noise-resilient version while incurring a multiplicative overhead of only O(logn)O(\log n) in its round complexity, with high probability. We show that our coding is optimal for some tasks, such as node-coloring of a clique. We further show how to simulate a large family of algorithms designed for distributed networks in the CONGEST(BB) model over a noisy beeping network. The simulation succeeds with high probability and incurs an asymptotic multiplicative overhead of O(BΔmin(n,Δ2))O(B\cdot \Delta \cdot \min(n,\Delta^2)) in the round complexity, where Δ\Delta is the maximal degree of the network. The overhead is tight for certain graphs, e.g., a clique. Further, this simulation implies a constant overhead coding for constant-degree networks

    Quasi-Optimal Leader Election Algorithms in Radio Networks with Loglogarithmic Awake Time Slots

    No full text
    A radio network (RN) is a distributed system consisting of nn radio stations. We design and analyze two distributed leader election protocols in RN where the number nn of radio stations is unknown. The first algorithm runs under the assumption of {\it limited collision detection}, while the second assumes that {\it no collision detection} is available. By ``limited collision detection'', we mean that if exactly one station sends (broadcasts) a message, then all stations (including the transmitter) that are listening at this moment receive the sent message. By contrast, the second no-collision-detection algorithm assumes that a station cannot simultaneously send and listen signals. Moreover, both protocols allow the stations to keep asleep as long as possible, thus minimizing their awake time slots (such algorithms are called {\it energy-efficient}). Both randomized protocols in RN areshown to elect a leader in O(log(n))O(\log{(n)}) expected time, with no station being awake for more than O(loglog(n))O(\log{\log{(n)}}) time slots. Therefore, a new class of efficient algorithms is set up that match the Ω(log(n))\Omega(\log{(n)}) time lower-bound established by Kushilevitz and Mansour

    Exploiting spontaneous transmissions for broadcasting and leader election in radio networks

    Get PDF
    We study two fundamental communication primitives: broadcasting and leader election in the classical model of multi-hop radio networks with unknown topology and without collision detection mechanisms. It has been known for almost 20 years that in undirected networks with n nodes and diameter D, randomized broadcasting requires Ω(D log n/D + log2 n) rounds, assuming that uninformed nodes are not allowed to communicate (until they are informed). Only very recently, Haeupler and Wajc (PODC'2016) showed that this bound can be improved for the model with spontaneous transmissions, providing an O(D log n log log n/log D + logO(1) n)-time broadcasting algorithm. In this article, we give a new and faster algorithm that completes broadcasting in O(D log n/log D + logO(1) n) time, succeeding with high probability. This yields the first optimal O(D)-time broadcasting algorithm whenever n is polynomial in D. Furthermore, our approach can be applied to design a new leader election algorithm that matches the performance of our broadcasting algorithm. Previously, all fast randomized leader election algorithms have used broadcasting as a subroutine and their complexity has been asymptotically strictly larger than the complexity of broadcasting. In particular, the fastest previously known randomized leader election algorithm of Ghaffari and Haeupler (SODA'2013) requires O(D log n/D min {log log n, log n/D} + logO(1) n)-time, succeeding with high probability. Our new algorithm again requires O(D log n/log D + logO(1) n) time, also succeeding with high probability

    Primary User Emulation Attacks in Cognitive Radio - An Experimental Demonstration and Analysis

    Get PDF
    Cognitive radio networks rely on the ability to avoid primary users, owners of the frequency, and prevent collisions for effective communication to take place. Additional malicious secondary users, jammers, may use a primary user emulation attacks to take advantage of the secondary user\u27s ability to avoid primary users and cause excessive and unexpected disruptions to communications. Two jamming/anti-jamming methods are investigated on Ettus Labs USRP 2 radios. First, pseudo-random channel hopping schemes are implemented for jammers to seek-and-disrupt secondary users while secondary users apply similar schemes to avoid all primary user signatures. In the second method the jammer uses adversarial bandit algorithms to avoid channels already heavily disrupted from primary user communications and concentrate efforts on channels heavily populated by secondary user communications. In addition the secondary users apply similar methods to avoid channels heavily occupied by jammers and primary users. The performance of these users is compared with and without the algorithm through channel delay, impact of algorithm on probability density functions, and user collision rate. Conclusions on made on the effectiveness of each technique

    Optimal Initialization and Gossiping Algorithms for Random Radio Networks

    No full text
    The initialization problem, also known as naming, consists to give a unique identifier ranging from 11 to nn to a set of nn indistinguishable nodes in a given network. We consider a network where nn nodes (processors) are randomly deployed in a square (resp. cube) XX. We assume that the time is slotted and the network is synchronous, two nodes are able to communicate if they are within distance at most of rr of each other (rr is the transmitting/receiving range). Moreover, if two or more neighbors of a processor uu transmit concurrently at the same time slot, then uu would not receive either messages. We suppose also that the anonymous nodes know neither the topology of the network nor the number of nodes in the network. Under this extremal scenario, we first show how the transmitting range of the deployed processors affects the typical characteristics of the network. Then, by allowing the nodes to transmit at various ranges we design sub-linear randomized initialization protocols~: In the two, resp. three, dimensional case, our randomized initialization algorithms run in O(n1/2logn1/2)O(n^{1/2} \log{n}^{1/2}), resp. O(n1/3logn2/3)O(n^{1/3} \log{n}^{2/3}), time slots. These latter protocols are based upon an optimal gossiping algorithm which is of independent interest
    corecore