1,570 research outputs found

    Randomized Initialization of a Wireless Multihop Network

    Full text link
    Address autoconfiguration is an important mechanism required to set the IP address of a node automatically in a wireless network. The address autoconfiguration, also known as initialization or naming, consists to give a unique identifier ranging from 1 to nn for a set of nn indistinguishable nodes. We consider a wireless network where nn nodes (processors) are randomly thrown in a square XX, uniformly and independently. We assume that the network is synchronous and two nodes are able to communicate if they are within distance at most of rr of each other (rr is the transmitting/receiving range). The model of this paper concerns nodes without the collision detection ability: if two or more neighbors of a processor uu transmit concurrently at the same time, then uu would not receive either messages. We suppose also that nodes know neither the topology of the network nor the number of nodes in the network. Moreover, they start indistinguishable, anonymous and unnamed. Under this extremal scenario, we design and analyze a fully distributed protocol to achieve the initialization task for a wireless multihop network of nn nodes uniformly scattered in a square XX. We show how the transmitting range of the deployed stations can affect the typical characteristics such as the degrees and the diameter of the network. By allowing the nodes to transmit at a range r= \sqrt{\frac{(1+\ell) \ln{n} \SIZE}{\pi n}} (slightly greater than the one required to have a connected network), we show how to design a randomized protocol running in expected time O(n3/2log2n)O(n^{3/2} \log^2{n}) in order to assign a unique number ranging from 1 to nn to each of the nn participating nodes

    Clustering algorithm in initialization of multi-hop wireless sensor networks

    Get PDF
    In most application scenarios of wireless sensor networks (WSN), sensor nodes are usually deployed randomly and do not have any knowledge about the network environment or even their ID's at the initial stage of their operations. In this paper, we address the clustering problems with a newly deployed multi-hop WSN where most existing clustering algorithms can hardly be used due to the absence of MAC link connections among the nodes. We propose an effective clustering algorithm based on a random contention model without the prior knowledge of the network and the ID's of nodes. Computer simulations have been used to show the effectiveness of the algorithm with a relatively low complexity if compared with existing schemes

    RTXP : A Localized Real-Time Mac-Routing Protocol for Wireless Sensor Networks

    Get PDF
    Protocols developed during the last years for Wireless Sensor Networks (WSNs) are mainly focused on energy efficiency and autonomous mechanisms (e.g. self-organization, self-configuration, etc). Nevertheless, with new WSN applications, appear new QoS requirements such as time constraints. Real-time applications require the packets to be delivered before a known time bound which depends on the application requirements. We particularly focus on applications which consist in alarms sent to the sink node. We propose Real-Time X-layer Protocol (RTXP), a real-time communication protocol. To the best of our knowledge, RTXP is the first MAC and routing real-time communication protocol that is not centralized, but instead relies only on local information. The solution is cross-layer (X-layer) because it allows to control the delays due to MAC and Routing layers interactions. RTXP uses a suited hop-count-based Virtual Coordinate System which allows deterministic medium access and forwarder selection. In this paper we describe the protocol mechanisms. We give theoretical bound on the end-to-end delay and the capacity of the protocol. Intensive simulation results confirm the theoretical predictions and allow to compare with a real-time centralized solution. RTXP is also simulated under harsh radio channel, in this case the radio link introduces probabilistic behavior. Nevertheless, we show that RTXP it performs better than a non-deterministic solution. It thus advocates for the usefulness of designing real-time (deterministic) protocols even for highly unreliable networks such as WSNs

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio

    Random Geometric Graphs and the Initialization Problem for Wireless Networks

    No full text
    32 pages. Tutorial invitéInternational audienceThe initialization problem, also known as naming, assigns one unique identifier (ranging from 1 to nn) to a set of n indistinguishable nodes (stations or processors) in a given wireless network NN. NN is composed of nn nodes randomly deployed within a square (or a cube) XX. We assume the time to be slotted and NN to be synchronous; two nodes are able to communicate if they are within a distance at most rr of each other (rr is the transmitting/receiving range). Moreover, if two or more neighbors of a processor uu transmit concurrently at the same round, uu does not receive either messages. After the analysis of various critical transmitting/sensing ranges for connectivity and coverage of randomly deployed sensor networks, we design sub-linear randomized initialization and gossip algorithms achieving O(n1/2log(n)1/2)O(n^1/2 \log(n)^1/2) and O(n1/3log(n)2/3)roundsinthetwodimensionalandthethreedimensionalcases,respectively.Next,weproposeenergyefficientinitializationandgossipalgorithmsrunninginO(n^1/3 \log(n)^2/3) rounds in the two-dimensional and the three-dimensional cases, respectively. Next, we propose energy-efficient initialization and gossip algorithms running in O(n^3/4 \log (n)^1/4)rounds,withnostationbeingawakeformorethanO(n1/4log(n)3/4) rounds, with no station being awake for more than O(n^1/4 \log (n)^3/4) rounds

    Reliable transmission power control for Internet of Things

    Get PDF

    Optimal Initialization and Gossiping Algorithms for Random Radio Networks

    No full text
    The initialization problem, also known as naming, consists to give a unique identifier ranging from 11 to nn to a set of nn indistinguishable nodes in a given network. We consider a network where nn nodes (processors) are randomly deployed in a square (resp. cube) XX. We assume that the time is slotted and the network is synchronous, two nodes are able to communicate if they are within distance at most of rr of each other (rr is the transmitting/receiving range). Moreover, if two or more neighbors of a processor uu transmit concurrently at the same time slot, then uu would not receive either messages. We suppose also that the anonymous nodes know neither the topology of the network nor the number of nodes in the network. Under this extremal scenario, we first show how the transmitting range of the deployed processors affects the typical characteristics of the network. Then, by allowing the nodes to transmit at various ranges we design sub-linear randomized initialization protocols~: In the two, resp. three, dimensional case, our randomized initialization algorithms run in O(n1/2logn1/2)O(n^{1/2} \log{n}^{1/2}), resp. O(n1/3logn2/3)O(n^{1/3} \log{n}^{2/3}), time slots. These latter protocols are based upon an optimal gossiping algorithm which is of independent interest

    Message and time efficient multi-broadcast schemes

    Full text link
    We consider message and time efficient broadcasting and multi-broadcasting in wireless ad-hoc networks, where a subset of nodes, each with a unique rumor, wish to broadcast their rumors to all destinations while minimizing the total number of transmissions and total time until all rumors arrive to their destination. Under centralized settings, we introduce a novel approximation algorithm that provides almost optimal results with respect to the number of transmissions and total time, separately. Later on, we show how to efficiently implement this algorithm under distributed settings, where the nodes have only local information about their surroundings. In addition, we show multiple approximation techniques based on the network collision detection capabilities and explain how to calibrate the algorithms' parameters to produce optimal results for time and messages.Comment: In Proceedings FOMC 2013, arXiv:1310.459
    corecore