108,496 research outputs found
Scale-free topology optimization for software-defined wireless sensor networks: A cyber-physical system
Due to the limited resource and vulnerability in wireless sensor networks, maximizing the network lifetime and improving
network survivability have become the top priority problem in network topology optimization. This article presents
a wireless sensor networks topology optimization model based on complex network theory and cyber-physical systems
using software-defined wireless sensor network architecture. The multiple-factor-driven virtual force field and network
division–oriented particle swarm algorithm are introduced into the deployment strategy of super-node for the implementation
in wireless sensor networks topology initialization, which help to rationally allocate heterogeneous network
resources and balance the energy consumption in wireless sensor networks. Furthermore, the preferential attachment
scheme guided by corresponding priority of crucial sensors is added into scale-free structure for optimization in topology
evolution process and for protection of vulnerable nodes in wireless sensor networks. Software-defined wireless
sensor network–based functional architecture is adopted to optimize the network evolution rules and algorithm parameters
using information cognition and flow-table configure mode. The theoretical analysis and experimental results
demonstrate that the proposed wireless sensor networks topology optimization model possesses both the small-world
effect and the scale-free property, which can contribute to extend the lifetime of wireless sensor networks with energy
efficiency and improve the robustness of wireless sensor networks with structure invulnerability
Recommended from our members
Protection of an intrusion detection engine with watermarking in ad hoc networks
Mobile ad hoc networks have received great attention in recent years, mainly due to the evolution of wireless networking and mobile computing hardware. Nevertheless, many inherent vulnerabilities exist in mobile ad hoc networks and their applications that affect the security of wireless transactions. As intrusion prevention mechanisms, such as encryption and authentication, are not sufficient we need a second line of defense, Intrusion Detection. In this pa-per we present an intrusion detection engine based on neural networks and a protection method based on watermarking techniques. In particular, we exploit information visualization and machine learning techniques in order to achieve intrusion detection and we authenticate the maps produced by the application of the intelligent techniques using a novel combined watermarking embedding method. The performance of the proposed model is evaluated under different traffic conditions, mobility patterns and visualization metrics
Channels Reallocation In Cognitive Radio Networks Based On DNA Sequence Alignment
Nowadays, It has been shown that spectrum scarcity increased due to
tremendous growth of new players in wireless base system by the evolution of
the radio communication. Resent survey found that there are many areas of the
radio spectrum that are occupied by authorized user/primary user (PU), which
are not fully utilized. Cognitive radios (CR) prove to next generation wireless
communication system that proposed as a way to reuse this under-utilised
spectrum in an opportunistic and non-interfering basis. A CR is a self-directed
entity in a wireless communications environment that senses its environment,
tracks changes, and reacts upon its findings and frequently exchanges
information with the networks for secondary user (SU). However, CR facing
collision problem with tracks changes i.e. reallocating of other empty channels
for SU while PU arrives. In this paper, channels reallocation technique based
on DNA sequence alignment algorithm for CR networks has been proposed.Comment: 12 page
Fundamental Limits on Latency in Transceiver Cache-Aided HetNets
Stringent mobile usage characteristics force wire- less networks to undergo a
paradigm shift from conventional connection-centric to content-centric
deployment. With respect to 5G, caching and heterogeneous networks (HetNet) are
key technologies that will facilitate the evolution of highly content- centric
networks by facilitating unified quality of service in terms of low-latency
communication. In this paper, we study the impact of transceiver caching on the
latency for a HetNet consisting of a single user, a receiver and one
cache-assisted transceiver. We define an information-theoretic metric, the
delivery time per bit (DTB), that captures the delivery latency. We establish
coinciding lower and upper bounds on the DTB as a function of cache size and
wireless channel parameters; thus, enabling a complete characterization of the
DTB optimality of the network under study. As a result, we identify cache
beneficial and non-beneficial channel regimes.Comment: 5 pages, ISIT 201
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
A Survey on Simultaneous Wireless Information and Power Transfer
This paper presents a comprehensive study related to simultaneous wireless information and power transfer (SWIPT) in different types of wireless communication setups. Harvesting energy using SWIPT is an appealing solution in the context of extending battery life of wireless devices for a fully sustainable communication system. Strong signal power increases power transfer, but also causes more interference in information transfer, causing realization of the SWIPT challenging problem. This article provides an overview of technical evolution of SWIPT. A survey and qualitative comparison of the existing SWIPT schemes is provided to demonstrate their limitations in the current and 5G networks. Open challenges are emphasized and guidelines are provided to adapt the existing schemes in order to overcome these limitations and make them fit for integrating with the modern and emerging next generation communication networks, such as 5G systems
Architecture to integrate broadband access networks and wireless grids
Today, the access networks face two main challenges: the increasing
bandwidth demand and mobility trends. All this will require fundamental
changes to the operations of access networks, the functionality of network
nodes and the architecture itself. By other side, the evolution of computing and
communication networks toward decentralized and distributed systems implies
that all the intelligence is on the edge nodes of the networks. Integrating wireless
devices with the traditional wired grid infrastructure will allow the access
(transfer, processing, etc) to the information that is now scattered across the different
devices. In this paper, we present a new architecture and a cost model to
support the new requirements of broadband access (fixed and nomadic users)
and wireless grids in an integrated way
ANALISA DAN IMPLEMENTASI JARINGAN WIRELESS MAC ADDRESS MENGGUNAKAN FILTERING PADA PT. FAYA KUNTURA AGUNG KONSULTINDO
The evolution of this era is become advancing as well for Technology Information and Telecommunications. This evolution has been explored in Wireless Technology, even in all devices such as smartphones, tablets and laptops can use it. The Internet has tremendously impacted culture and it become a daily necessity by people in the world, as the internet can support the process of communicating, learning, and data transfer. Places that use wireless networks have started a lot such as schools, universities, and companies. Yet, wireless networks still have security that is quite vulnerable because it can be misused by other parties. To minimize this problem we can use MAC Address Filtering. MAC Address Filtering is a technique for prevents access to a network if the MAC Address of the devices attempting to connect does not match any addresses marked as allowed. MAC Address Filtering has 2 tasks of verification so before it does filtering, the user must log in first using the MAC Address that has been registered and then enter the username and password if it matches the MAC Address then the login will be successful, otherwise, it will be rejected. This wireless MAC Address Filtering security can avoid hackers who can enter the wireless network which makes a slow network
- …