129 research outputs found

    Sensing task handover for indoor clustered wireless sensor network

    Get PDF
    This paper presents the proposal of implementing sensing task handover initiation control for wireless sensor network deployed in indoor environment. The structure of the wireless sensor network is based on indoor clustering so that sensor nodes are grouped in different clusters according to room partitions. For such a network, a simple and efficient multi-node handover initiation control method is proposed for the decision of handover initiation by comparing the combined received signal strengths and the number of effective nodes between two neighbouring clusters. Experiments were conducted to test the possibility and evaluate the performance of the proposed method. The results show that sensing task handover is possible to happen at accurate time while crossing boundary between two clusters by applying the proposed method

    An adaptable fuzzy-based model for predicting link quality in robot networks.

    Get PDF
    It is often essential for robots to maintain wireless connectivity with other systems so that commands, sensor data, and other situational information can be exchanged. Unfortunately, maintaining sufficient connection quality between these systems can be problematic. Robot mobility, combined with the attenuation and rapid dynamics associated with radio wave propagation, can cause frequent link quality (LQ) issues such as degraded throughput, temporary disconnects, or even link failure. In order to proactively mitigate such problems, robots must possess the capability, at the application layer, to gauge the quality of their wireless connections. However, many of the existing approaches lack adaptability or the framework necessary to rapidly build and sustain an accurate LQ prediction model. The primary contribution of this dissertation is the introduction of a novel way of blending machine learning with fuzzy logic so that an adaptable, yet intuitive LQ prediction model can be formed. Another significant contribution includes the evaluation of a unique active and incremental learning framework for quickly constructing and maintaining prediction models in robot networks with minimal sampling overhead

    Quantifying Potential Energy Efficiency Gain in Green Cellular Wireless Networks

    Full text link
    Conventional cellular wireless networks were designed with the purpose of providing high throughput for the user and high capacity for the service provider, without any provisions of energy efficiency. As a result, these networks have an enormous Carbon footprint. In this paper, we describe the sources of the inefficiencies in such networks. First we present results of the studies on how much Carbon footprint such networks generate. We also discuss how much more mobile traffic is expected to increase so that this Carbon footprint will even increase tremendously more. We then discuss specific sources of inefficiency and potential sources of improvement at the physical layer as well as at higher layers of the communication protocol hierarchy. In particular, considering that most of the energy inefficiency in cellular wireless networks is at the base stations, we discuss multi-tier networks and point to the potential of exploiting mobility patterns in order to use base station energy judiciously. We then investigate potential methods to reduce this inefficiency and quantify their individual contributions. By a consideration of the combination of all potential gains, we conclude that an improvement in energy consumption in cellular wireless networks by two orders of magnitude, or even more, is possible.Comment: arXiv admin note: text overlap with arXiv:1210.843

    A Vision and Framework for the High Altitude Platform Station (HAPS) Networks of the Future

    Full text link
    A High Altitude Platform Station (HAPS) is a network node that operates in the stratosphere at an of altitude around 20 km and is instrumental for providing communication services. Precipitated by technological innovations in the areas of autonomous avionics, array antennas, solar panel efficiency levels, and battery energy densities, and fueled by flourishing industry ecosystems, the HAPS has emerged as an indispensable component of next-generations of wireless networks. In this article, we provide a vision and framework for the HAPS networks of the future supported by a comprehensive and state-of-the-art literature review. We highlight the unrealized potential of HAPS systems and elaborate on their unique ability to serve metropolitan areas. The latest advancements and promising technologies in the HAPS energy and payload systems are discussed. The integration of the emerging Reconfigurable Smart Surface (RSS) technology in the communications payload of HAPS systems for providing a cost-effective deployment is proposed. A detailed overview of the radio resource management in HAPS systems is presented along with synergistic physical layer techniques, including Faster-Than-Nyquist (FTN) signaling. Numerous aspects of handoff management in HAPS systems are described. The notable contributions of Artificial Intelligence (AI) in HAPS, including machine learning in the design, topology management, handoff, and resource allocation aspects are emphasized. The extensive overview of the literature we provide is crucial for substantiating our vision that depicts the expected deployment opportunities and challenges in the next 10 years (next-generation networks), as well as in the subsequent 10 years (next-next-generation networks).Comment: To appear in IEEE Communications Surveys & Tutorial

    Contributions to the security of cognitive radio networks

    Get PDF
    The increasing emergence of wireless applications along with the static spectrum allocation followed by regulatory bodies has led to a high inefficiency in spectrum usage, and the lack of spectrum for new services. In this context, Cognitive Radio (CR) technology has been proposed as a possible solution to reuse the spectrum being underutilized by licensed services. CRs are intelligent devices capable of sensing the medium and identifying those portions of the spectrum being unused. Based on their current perception of the environment and on that learned from past experiences, they can optimally tune themselves with regard to parameters such as frequency, coding and modulation, among others. Due to such properties, Cognitive Radio Networks (CRNs) can act as secondary users of the spectrum left unused by their legal owners or primary users, under the requirement of not interfering primary communications. The successful deployment of these networks relies on the proper design of mechanisms in order to efficiently detect spectrum holes, adapt to changing environment conditions and manage the available spectrum. Furthermore, the need for addressing security issues is evidenced by two facts. First, as for any other type of wireless network, the air is used as communications medium and can easily be accessed by attackers. On the other hand, the particular attributes of CRNs offer new opportunities to malicious users, ranging from providing wrong information on the radio environment to disrupting the cognitive mechanisms, which could severely undermine the operation of these networks. In this Ph.D thesis we have approached the challenge of securing Cognitive Radio Networks. Because CR technology is still evolving, to achieve this goal involves not only providing countermeasures for existing attacks but also to identify new potential threats and evaluate their impact on CRNs performance. The main contributions of this thesis can be summarized as follows. First, a critical study on the State of the Art in this area is presented. A qualitative analysis of those threats to CRNs already identified in the literature is provided, and the efficacy of existing countermeasures is discussed. Based on this work, a set of guidelines are designed in order to design a detection system for the main threats to CRNs. Besides, a high level description of the components of this system is provided, being it the second contribution of this thesis. The third contribution is the proposal of a new cross-layer attack to the Transmission Control Protocol (TCP) in CRNs. An analytical model of the impact of this attack on the throughput of TCP connections is derived, and a set of countermeasures in order to detect and mitigate the effect of such attack are proposed. One of the main threats to CRNs is the Primary User Emulation (PUE) attack. This attack prevents CRNs from using available portions of the spectrum and can even lead to a Denial of Service (DoS). In the fourth contribution of this the method is proposed in order to deal with such attack. The method relies on a set of time measures provided by the members of the network and allows estimating the position of an emitter. This estimation is then used to determine the legitimacy of a given transmission and detect PUE attacks. Cooperative methods are prone to be disrupted by malicious nodes reporting false data. This problem is addressed, in the context of cooperative location, in the fifth and last contribution of this thesis. A method based on Least Median Squares (LMS) fitting is proposed in order to detect forged measures and make the location process robust to them. The efficiency and accuracy of the proposed methodologies are demonstrated by means of simulation

    Recent Advances in Wireless Communications and Networks

    Get PDF
    This book focuses on the current hottest issues from the lowest layers to the upper layers of wireless communication networks and provides "real-time" research progress on these issues. The authors have made every effort to systematically organize the information on these topics to make it easily accessible to readers of any level. This book also maintains the balance between current research results and their theoretical support. In this book, a variety of novel techniques in wireless communications and networks are investigated. The authors attempt to present these topics in detail. Insightful and reader-friendly descriptions are presented to nourish readers of any level, from practicing and knowledgeable communication engineers to beginning or professional researchers. All interested readers can easily find noteworthy materials in much greater detail than in previous publications and in the references cited in these chapters

    A survey of self organisation in future cellular networks

    Get PDF
    This article surveys the literature over the period of the last decade on the emerging field of self organisation as applied to wireless cellular communication networks. Self organisation has been extensively studied and applied in adhoc networks, wireless sensor networks and autonomic computer networks; however in the context of wireless cellular networks, this is the first attempt to put in perspective the various efforts in form of a tutorial/survey. We provide a comprehensive survey of the existing literature, projects and standards in self organising cellular networks. Additionally, we also aim to present a clear understanding of this active research area, identifying a clear taxonomy and guidelines for design of self organising mechanisms. We compare strength and weakness of existing solutions and highlight the key research areas for further development. This paper serves as a guide and a starting point for anyone willing to delve into research on self organisation in wireless cellular communication networks

    Efficient radio resource management in next generation wireless networks

    Get PDF
    The current decade has witnessed a phenomenal growth in mobile wireless communication networks and subscribers. In 2015, mobile wireless devices and connections were reported to have grown to about 7.9 billion, exceeding human population. The explosive growth in mobile wireless communication network subscribers has created a huge demand for wireless network capacity, ubiquitous wireless network coverage, and enhanced Quality of Service (QoS). These demands have led to several challenging problems for wireless communication networks operators and designers. The Next Generation Wireless Networks (NGWNs) will support high mobility communications, such as communication in high-speed rails. Mobile users in such high mobility environment demand reliable QoS, however, such users are plagued with a poor signal-tonoise ratio, due to the high vehicular penetration loss, increased transmission outage and handover information overhead, leading to poor QoS provisioning for the networks' mobile users. Providing a reliable QoS for high mobility users remains one of the unique challenges for NGWNs. The increased wireless network capacity and coverage of NGWNs means that mobile communication users at the cell-edge should have enhanced network performance. However, due to path loss (path attenuation), interference, and radio background noise, mobile communication users at the cell-edge can experience relatively poor transmission channel qualities and subsequently forced to transmit at a low bit transmission rate, even when the wireless communication networks can support high bit transmission rate. Furthermore, the NGWNs are envisioned to be Heterogeneous Wireless Networks (HWNs). The NGWNs are going to be the integration platform of diverse homogeneous wireless communication networks for a convergent wireless communication network. The HWNs support single and multiple calls (group calls), simultaneously. Decision making is an integral core of radio resource management. One crucial decision making in HWNs is network selection. Network selection addresses the problem of how to select the best available access network for a given network user connection. For the integrated platform of HWNs to be truly seamless and efficient, a robust and stable wireless access network selection algorithm is needed. To meet these challenges for the different mobile wireless communication network users, the NGWNs will have to provide a great leap in wireless network capacity, coverage, QoS, and radio resource utilization. Moving wireless communication networks (mobile hotspots) have been proposed as a solution to providing reliable QoS to high mobility users. In this thesis, an Adaptive Thinning Mobility Aware (ATMA) Call Admission Control (CAC) algorithm for improving the QoS and radio resource utilization of the mobile hotspot networks, which are of critical importance for communicating nodes in moving wireless networks is proposed. The performance of proposed ATMA CAC scheme is investigated and compare it with the traditional CAC scheme. The ATMA scheme exploits the mobility events in the highspeed mobility communication environment and the calls (new and handoff calls) generation pattern to enhance the QoS (new call blocking and handoff call dropping probabilities) of the mobile users. The numbers of new and handoff calls in wireless communication networks are dynamic random processes that can be effectively modeled by the Continuous Furthermore, the NGWNs are envisioned to be Heterogeneous Wireless Networks (HWNs). The NGWNs are going to be the integration platform of diverse homogeneous wireless communication networks for a convergent wireless communication network. The HWNs support single and multiple calls (group calls), simultaneously. Decision making is an integral core of radio resource management. One crucial decision making in HWNs is network selection. Network selection addresses the problem of how to select the best available access network for a given network user connection. For the integrated platform of HWNs to be truly seamless and efficient, a robust and stable wireless access network selection algorithm is needed. To meet these challenges for the different mobile wireless communication network users, the NGWNs will have to provide a great leap in wireless network capacity, coverage, QoS, and radio resource utilization. Moving wireless communication networks (mobile hotspots) have been proposed as a solution to providing reliable QoS to high mobility users. In this thesis, an Adaptive Thinning Mobility Aware (ATMA) Call Admission Control (CAC) algorithm for improving the QoS and radio resource utilization of the mobile hotspot networks, which are of critical importance for communicating nodes in moving wireless networks is proposed

    Adaptive trust and reputation system as a security service in group communications

    Get PDF
    Group communications has been facilitating many emerging applications which require packet delivery from one or more sender(s) to multiple receivers. Owing to the multicasting and broadcasting nature, group communications are susceptible to various kinds of attacks. Though a number of proposals have been reported to secure group communications, provisioning security in group communications remains a critical and challenging issue. This work first presents a survey on recent advances in security requirements and services in group communications in wireless and wired networks, and discusses challenges in designing secure group communications in these networks. Effective security services to secure group communications are then proposed. This dissertation also introduces the taxonomy of security services, which can be applied to secure group communications, and evaluates existing secure group communications schemes. This dissertation work analyzes a number of vulnerabilities against trust and reputation systems, and proposes a threat model to predict attack behaviors. This work also considers scenarios in which multiple attacking agents actively and collaboratively attack the whole network as well as a specific individual node. The behaviors may be related to both performance issues and security issues. Finally, this work extensively examines and substantiates the security of the proposed trust and reputation system. This work next discusses the proposed trust and reputation system for an anonymous network, referred to as the Adaptive Trust-based Anonymous Network (ATAN). The distributed and decentralized network management in ATAN does not require a central authority so that ATAN alleviates the problem of a single point of failure. In ATAN, the trust and reputation system aims to enhance anonymity by establishing a trust and reputation relationship between the source and the forwarding members. The trust and reputation relationship of any two nodes is adaptive to new information learned by these two nodes or recommended from other trust nodes. Therefore, packets are anonymously routed from the \u27trusted\u27 source to the destination through \u27trusted\u27 intermediate nodes, thereby improving anonymity of communications. In the performance analysis, the ratio of the ATAN header and data payload is around 0.1, which is relatively small. This dissertation offers analysis on security services on group communications. It illustrates that these security services are needed to incorporate with each other such that group communications can be secure. Furthermore, the adaptive trust and reputation system is proposed to integrate the concept of trust and reputation into communications. Although deploying the trust and reputation system incurs some overheads in terms of storage spaces, bandwidth and computation cycles, it shows a very promising performance that enhance users\u27 confidence in using group communications, and concludes that the trust and reputation system should be deployed as another layer of security services to protect group communications against malicious adversaries and attacks

    Wireless Positioning and Tracking for Internet of Things in GPS-denied Environments

    Get PDF
    Wireless positioning and tracking have long been a critical technology for various applications such as indoor/outdoor navigation, surveillance, tracking of assets and employees, and guided tours, among others. Proliferation of Internet of Things (IoT) devices, the evolution of smart cities, and vulnerabilities of traditional localization technologies to cyber-attacks such as jamming and spoofing of GPS necessitate development of novel radio frequency (RF) localization and tracking technologies that are accurate, energy-efficient, robust, scalable, non-invasive and secure. The main challenges that are considered in this research work are obtaining fundamental limits of localization accuracy using received signal strength (RSS) information with directional antennas, and use of burst and intermittent measurements for localization. In this dissertation, we consider various RSS-based techniques that rely on existing wireless infrastructures to obtain location information of corresponding IoT devices. In the first approach, we present a detailed study on localization accuracy of UHF RF IDentification (RFID) systems considering realistic radiation pattern of directional antennas. Radiation patterns of antennas and antenna arrays may significantly affect RSS in wireless networks. The sensitivity of tag antennas and receiver antennas play a crucial role. In this research, we obtain the fundamental limits of localization accuracy considering radiation patterns and sensitivity of the antennas by deriving Cramer-Rao Lower Bounds (CRLBs) using estimation theory techniques. In the second approach, we consider a millimeter Wave (mmWave) system with linear antenna array using beamforming radiation patterns to localize user equipment in an indoor environment. In the third approach, we introduce a tracking and occupancy monitoring system that uses ambient, bursty, and intermittent WiFi probe requests radiated from mobile devices. Burst and intermittent signals are prominent characteristics of IoT devices; using these features, we propose a tracking technique that uses interacting multiple models (IMM) with Kalman filtering. Finally, we tackle the problem of indoor UAV navigation to a wireless source using its Rayleigh fading RSS measurements. We propose a UAV navigation technique based on Q-learning that is a model-free reinforcement learning technique to tackle the variation in the RSS caused by Rayleigh fading
    corecore