1,141 research outputs found

    Energetic Performance of Service-oriented Multi-radio Networks: Issues and Perspectives

    Get PDF
    Wireless devices now hold multiple radio interfaces, allowing to switch from one network to another according to required connectivity and related quality. Still, the selection of the best radio interface for a specific connection is under the responsibility of the end-user in most cases. Integrated multi-radio network management so as to improve the overall performance of the network(s) has led to a number of research efforts over the last few years. However, several challenges remain due to the inherent complexity of the problem. This paper specifically concentrates on the comprehensive analysis of energy-efficient multi-radio networking for pervasive computing. Building upon the service oriented architectural style, we consider pervasive networks of services, which are deployed on the various networked nodes. The issue is then to optimize the energetic performance of the pervasive network through careful selection of the radio link over which service access should be realized for each such access. This leads us to examine first the energetic performance of service access for most common wireless interfaces in use today (Bluetooth, WiFi and GPRS) and then introduce a formal model of service-oriented multi-radio networks. The proposed model enables characterizing the optimal network configuration in terms of energetic performance, which is shown to be a NP-hard problem and thus requires adequate approximation

    Secure Routing in Wireless Mesh Networks

    Get PDF
    Wireless mesh networks (WMNs) have emerged as a promising concept to meet the challenges in next-generation networks such as providing flexible, adaptive, and reconfigurable architecture while offering cost-effective solutions to the service providers. Unlike traditional Wi-Fi networks, with each access point (AP) connected to the wired network, in WMNs only a subset of the APs are required to be connected to the wired network. The APs that are connected to the wired network are called the Internet gateways (IGWs), while the APs that do not have wired connections are called the mesh routers (MRs). The MRs are connected to the IGWs using multi-hop communication. The IGWs provide access to conventional clients and interconnect ad hoc, sensor, cellular, and other networks to the Internet. However, most of the existing routing protocols for WMNs are extensions of protocols originally designed for mobile ad hoc networks (MANETs) and thus they perform sub-optimally. Moreover, most routing protocols for WMNs are designed without security issues in mind, where the nodes are all assumed to be honest. In practical deployment scenarios, this assumption does not hold. This chapter provides a comprehensive overview of security issues in WMNs and then particularly focuses on secure routing in these networks. First, it identifies security vulnerabilities in the medium access control (MAC) and the network layers. Various possibilities of compromising data confidentiality, data integrity, replay attacks and offline cryptanalysis are also discussed. Then various types of attacks in the MAC and the network layers are discussed. After enumerating the various types of attacks on the MAC and the network layer, the chapter briefly discusses on some of the preventive mechanisms for these attacks.Comment: 44 pages, 17 figures, 5 table

    Evaluating energy consumption on low-end smartphones

    Get PDF
    The relationship between battery consumption in smartphones and the usage statistics of a phone is direct. Modern smartphones, even low-end, are equipped with multiple wireless technologies, e.g. GSM, 3G, WiFi and Bluetooth. Each of these technologies has a different energy consumption profile. A wireless mesh project in the Mankosi community in rural South Africa is about to introduce low-end smartphones onto the network. The mesh network is powered with solar-charged batteries because the community at present does not have electricity. Local residents also use these batteries to recharge cell phones at a nominal cost. Introduction of smartphones will increase the recharge frequency as phone usage will increase; thus draining a phone battery more quickly, as well as escalate recharge costs. Thus, the smartphones must be chosen and used effectively in order for batteries to last longer. Related work identifies WiFi wireless technology as the most battery efficient way of transfer when compared to GSM, 3G and Bluetooth. This research proposes experiments to further investigate energy efficiency of WiFi in low-end smartphones that we intend to use for local and breakout voice over Internet protocol (VoIP) calls and data services, on a rural wireless mesh network

    Advanced Protocols for Peer-to-Peer Data Transmission in Wireless Gigabit Networks

    Get PDF
    This thesis tackles problems on IEEE 802.11 MAC layer, network layer and application layer, to further push the performance of wireless P2P applications in a holistic way. It contributes to the better understanding and utilization of two major IEEE 802.11 MAC features, frame aggregation and block acknowledgement, to the design and implementation of opportunistic networks on off-the-shelf hardware and proposes a document exchange protocol, including document recommendation. First, this thesis contributes a measurement study of the A-MPDU frame aggregation behavior of IEEE 802.11n in a real-world, multi-hop, indoor mesh testbed. Furthermore, this thesis presents MPDU payload adaptation (MPA) to utilize A-MPDU subframes to increase the overall throughput under bad channel conditions. MPA adapts the size of MAC protocol data units to channel conditions, to increase the throughput and lower the delay in error-prone channels. The results suggest that under erroneous conditions throughput can be maximized by limiting the MPDU size. As second major contribution, this thesis introduces Neighborhood-aware OPPortunistic networking on Smartphones (NOPPoS). NOPPoS creates an opportunistic, pocket-switched network using current generation, off-the-shelf mobile devices. As main novel feature, NOPPoS is highly responsive to node mobility due to periodic, low-energy scans of its environment, using Bluetooth Low Energy advertisements. The last major contribution is the Neighborhood Document Sharing (NDS) protocol. NDS enables users to discover and retrieve arbitrary documents shared by other users in their proximity, i.e. in the communication range of their IEEE 802.11 interface. However, IEEE 802.11 connections are only used on-demand during file transfers and indexing of files in the proximity of the user. Simulations show that NDS interconnects over 90 \% of all devices in communication range. Finally, NDS is extended by the content recommendation system User Preference-based Probability Spreading (UPPS), a graph-based approach. It integrates user-item scoring into a graph-based tag-aware item recommender system. UPPS utilizes novel formulas for affinity and similarity scoring, taking into account user-item preference in the mass diffusion of the recommender system. The presented results show that UPPS is a significant improvement to previous approaches

    Face-to-face media sharing using wireless mobile devices

    Get PDF
    Abstract Advanced personal wireless mobile devices, such as today 's emerging smart-phones, ar

    A Trust-Based Relay Selection Approach to the Multi-Hop Network Formation Problem in Cognitive Radio Networks

    Get PDF
    One of the major challenges for today’s wireless communications is to meet the growing demand for supporting an increasing diversity of wireless applications with limited spectrum resource. In cooperative communications and networking, users share resources and collaborate in a distributed approach, similar to entities of active social groups in self organizational communities. Users’ information may be shared by the user and also by the cooperative users, in distributed transmission. Cooperative communications and networking is a fairly new communication paradigm that promises significant capacity and multiplexing gain increase in wireless networks. This research will provide a cooperative relay selection framework that exploits the similarity of cognitive radio networks to social networks. It offers a multi-hop, reputation-based power control game for routing. In this dissertation, a social network model provides a humanistic approach to predicting relay selection and network analysis in cognitive radio networks

    A Survey on Virtualization of Wireless Sensor Networks

    Get PDF
    Wireless Sensor Networks (WSNs) are gaining tremendous importance thanks to their broad range of commercial applications such as in smart home automation, health-care and industrial automation. In these applications multi-vendor and heterogeneous sensor nodes are deployed. Due to strict administrative control over the specific WSN domains, communication barriers, conflicting goals and the economic interests of different WSN sensor node vendors, it is difficult to introduce a large scale federated WSN. By allowing heterogeneous sensor nodes in WSNs to coexist on a shared physical sensor substrate, virtualization in sensor network may provide flexibility, cost effective solutions, promote diversity, ensure security and increase manageability. This paper surveys the novel approach of using the large scale federated WSN resources in a sensor virtualization environment. Our focus in this paper is to introduce a few design goals, the challenges and opportunities of research in the field of sensor network virtualization as well as to illustrate a current status of research in this field. This paper also presents a wide array of state-of-the art projects related to sensor network virtualization
    • …
    corecore