108,496 research outputs found

    Scale-free topology optimization for software-defined wireless sensor networks: A cyber-physical system

    Get PDF
    Due to the limited resource and vulnerability in wireless sensor networks, maximizing the network lifetime and improving network survivability have become the top priority problem in network topology optimization. This article presents a wireless sensor networks topology optimization model based on complex network theory and cyber-physical systems using software-defined wireless sensor network architecture. The multiple-factor-driven virtual force field and network division–oriented particle swarm algorithm are introduced into the deployment strategy of super-node for the implementation in wireless sensor networks topology initialization, which help to rationally allocate heterogeneous network resources and balance the energy consumption in wireless sensor networks. Furthermore, the preferential attachment scheme guided by corresponding priority of crucial sensors is added into scale-free structure for optimization in topology evolution process and for protection of vulnerable nodes in wireless sensor networks. Software-defined wireless sensor network–based functional architecture is adopted to optimize the network evolution rules and algorithm parameters using information cognition and flow-table configure mode. The theoretical analysis and experimental results demonstrate that the proposed wireless sensor networks topology optimization model possesses both the small-world effect and the scale-free property, which can contribute to extend the lifetime of wireless sensor networks with energy efficiency and improve the robustness of wireless sensor networks with structure invulnerability

    Channels Reallocation In Cognitive Radio Networks Based On DNA Sequence Alignment

    Full text link
    Nowadays, It has been shown that spectrum scarcity increased due to tremendous growth of new players in wireless base system by the evolution of the radio communication. Resent survey found that there are many areas of the radio spectrum that are occupied by authorized user/primary user (PU), which are not fully utilized. Cognitive radios (CR) prove to next generation wireless communication system that proposed as a way to reuse this under-utilised spectrum in an opportunistic and non-interfering basis. A CR is a self-directed entity in a wireless communications environment that senses its environment, tracks changes, and reacts upon its findings and frequently exchanges information with the networks for secondary user (SU). However, CR facing collision problem with tracks changes i.e. reallocating of other empty channels for SU while PU arrives. In this paper, channels reallocation technique based on DNA sequence alignment algorithm for CR networks has been proposed.Comment: 12 page

    Fundamental Limits on Latency in Transceiver Cache-Aided HetNets

    Full text link
    Stringent mobile usage characteristics force wire- less networks to undergo a paradigm shift from conventional connection-centric to content-centric deployment. With respect to 5G, caching and heterogeneous networks (HetNet) are key technologies that will facilitate the evolution of highly content- centric networks by facilitating unified quality of service in terms of low-latency communication. In this paper, we study the impact of transceiver caching on the latency for a HetNet consisting of a single user, a receiver and one cache-assisted transceiver. We define an information-theoretic metric, the delivery time per bit (DTB), that captures the delivery latency. We establish coinciding lower and upper bounds on the DTB as a function of cache size and wireless channel parameters; thus, enabling a complete characterization of the DTB optimality of the network under study. As a result, we identify cache beneficial and non-beneficial channel regimes.Comment: 5 pages, ISIT 201

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    A Survey on Simultaneous Wireless Information and Power Transfer

    Get PDF
    This paper presents a comprehensive study related to simultaneous wireless information and power transfer (SWIPT) in different types of wireless communication setups. Harvesting energy using SWIPT is an appealing solution in the context of extending battery life of wireless devices for a fully sustainable communication system. Strong signal power increases power transfer, but also causes more interference in information transfer, causing realization of the SWIPT challenging problem. This article provides an overview of technical evolution of SWIPT. A survey and qualitative comparison of the existing SWIPT schemes is provided to demonstrate their limitations in the current and 5G networks. Open challenges are emphasized and guidelines are provided to adapt the existing schemes in order to overcome these limitations and make them fit for integrating with the modern and emerging next generation communication networks, such as 5G systems

    Architecture to integrate broadband access networks and wireless grids

    Get PDF
    Today, the access networks face two main challenges: the increasing bandwidth demand and mobility trends. All this will require fundamental changes to the operations of access networks, the functionality of network nodes and the architecture itself. By other side, the evolution of computing and communication networks toward decentralized and distributed systems implies that all the intelligence is on the edge nodes of the networks. Integrating wireless devices with the traditional wired grid infrastructure will allow the access (transfer, processing, etc) to the information that is now scattered across the different devices. In this paper, we present a new architecture and a cost model to support the new requirements of broadband access (fixed and nomadic users) and wireless grids in an integrated way

    ANALISA DAN IMPLEMENTASI JARINGAN WIRELESS MAC ADDRESS MENGGUNAKAN FILTERING PADA PT. FAYA KUNTURA AGUNG KONSULTINDO

    Get PDF
    The evolution of this era is become advancing as well for Technology Information and Telecommunications. This evolution has been explored in Wireless Technology, even in all devices such as smartphones, tablets and laptops can use it. The Internet has tremendously impacted culture and it become a daily necessity by people in the world, as the internet can support the process of communicating, learning, and data transfer. Places that use wireless networks have started a lot such as schools, universities, and companies. Yet, wireless networks still have security that is quite vulnerable because it can be misused by other parties. To minimize this problem we can use MAC Address Filtering. MAC Address Filtering is a technique for prevents access to a network if the MAC Address of the devices attempting to connect does not match any addresses marked as allowed. MAC Address Filtering has 2 tasks of verification so before it does filtering, the user must log in first using the MAC Address that has been registered and then enter the username and password if it matches the MAC Address then the login will be successful, otherwise, it will be rejected. This wireless MAC Address Filtering security can avoid hackers who can enter the wireless network which makes a slow network
    corecore