702 research outputs found

    Uav-assisted data collection in wireless sensor networks: A comprehensive survey

    Get PDF
    Wireless sensor networks (WSNs) are usually deployed to different areas of interest to sense phenomena, process sensed data, and take actions accordingly. The networks are integrated with many advanced technologies to be able to fulfill their tasks that is becoming more and more complicated. These networks tend to connect to multimedia networks and to process huge data over long distances. Due to the limited resources of static sensor nodes, WSNs need to cooperate with mobile robots such as unmanned ground vehicles (UGVs), or unmanned aerial vehicles (UAVs) in their developments. The mobile devices show their maneuverability, computational and energystorage abilities to support WSNs in multimedia networks. This paper addresses a comprehensive survey of almost scenarios utilizing UAVs and UGVs with strogly emphasising on UAVs for data collection in WSNs. Either UGVs or UAVs can collect data from static sensor nodes in the monitoring fields. UAVs can either work alone to collect data or can cooperate with other UAVs to increase their coverage in their working fields. Different techniques to support the UAVs are addressed in this survey. Communication links, control algorithms, network structures and different mechanisms are provided and compared. Energy consumption or transportation cost for such scenarios are considered. Opening issues and challenges are provided and suggested for the future developments

    Relaying in the Internet of Things (IoT): A Survey

    Get PDF
    The deployment of relays between Internet of Things (IoT) end devices and gateways can improve link quality. In cellular-based IoT, relays have the potential to reduce base station overload. The energy expended in single-hop long-range communication can be reduced if relays listen to transmissions of end devices and forward these observations to gateways. However, incorporating relays into IoT networks faces some challenges. IoT end devices are designed primarily for uplink communication of small-sized observations toward the network; hence, opportunistically using end devices as relays needs a redesign of both the medium access control (MAC) layer protocol of such end devices and possible addition of new communication interfaces. Additionally, the wake-up time of IoT end devices needs to be synchronized with that of the relays. For cellular-based IoT, the possibility of using infrastructure relays exists, and noncellular IoT networks can leverage the presence of mobile devices for relaying, for example, in remote healthcare. However, the latter presents problems of incentivizing relay participation and managing the mobility of relays. Furthermore, although relays can increase the lifetime of IoT networks, deploying relays implies the need for additional batteries to power them. This can erode the energy efficiency gain that relays offer. Therefore, designing relay-assisted IoT networks that provide acceptable trade-offs is key, and this goes beyond adding an extra transmit RF chain to a relay-enabled IoT end device. There has been increasing research interest in IoT relaying, as demonstrated in the available literature. Works that consider these issues are surveyed in this paper to provide insight into the state of the art, provide design insights for network designers and motivate future research directions

    Instantly Decodable Network Coding: From Centralized to Device-to-Device Communications

    Get PDF
    From its introduction to its quindecennial, network coding has built a strong reputation for enhancing packet recovery and achieving maximum information flow in both wired and wireless networks. Traditional studies focused on optimizing the throughput of the system by proposing elaborate schemes able to reach the network capacity. With the shift toward distributed computing on mobile devices, performance and complexity become both critical factors that affect the efficiency of a coding strategy. Instantly decodable network coding presents itself as a new paradigm in network coding that trades off these two aspects. This paper review instantly decodable network coding schemes by identifying, categorizing, and evaluating various algorithms proposed in the literature. The first part of the manuscript investigates the conventional centralized systems, in which all decisions are carried out by a central unit, e.g., a base-station. In particular, two successful approaches known as the strict and generalized instantly decodable network are compared in terms of reliability, performance, complexity, and packet selection methodology. The second part considers the use of instantly decodable codes in a device-to-device communication network, in which devices speed up the recovery of the missing packets by exchanging network coded packets. Although the performance improvements are directly proportional to the computational complexity increases, numerous successful schemes from both the performance and complexity viewpoints are identified

    Antennas and Propagation Aspects for Emerging Wireless Communication Technologies

    Get PDF
    The increasing demand for high data rate applications and the delivery of zero-latency multimedia content drives technological evolutions towards the design and implementation of next-generation broadband wireless networks. In this context, various novel technologies have been introduced, such as millimeter wave (mmWave) transmission, massive multiple input multiple output (MIMO) systems, and non-orthogonal multiple access (NOMA) schemes in order to support the vision of fifth generation (5G) wireless cellular networks. The introduction of these technologies, however, is inextricably connected with a holistic redesign of the current transceiver structures, as well as the network architecture reconfiguration. To this end, ultra-dense network deployment along with distributed massive MIMO technologies and intermediate relay nodes have been proposed, among others, in order to ensure an improved quality of services to all mobile users. In the same framework, the design and evaluation of novel antenna configurations able to support wideband applications is of utmost importance for 5G context support. Furthermore, in order to design reliable 5G systems, the channel characterization in these frequencies and in the complex propagation environments cannot be ignored because it plays a significant role. In this Special Issue, fourteen papers are published, covering various aspects of novel antenna designs for broadband applications, propagation models at mmWave bands, the deployment of NOMA techniques, radio network planning for 5G networks, and multi-beam antenna technologies for 5G wireless communications

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    Energy and bursty packet loss tradeoff over fading channels: a system-level model

    Get PDF
    Energy efficiency and quality of service (QoS) guarantees are the key design goals for the 5G wireless communication systems. In this context, we discuss a multiuser scheduling scheme over fading channels for loss tolerant applications. The loss tolerance of the application is characterized in terms of different parameters that contribute to quality of experience (QoE) for the application. The mobile users are scheduled opportunistically such that a minimum QoS is guaranteed. We propose an opportunistic scheduling scheme and address the cross-layer design framework when channel state information (CSI) is not perfectly available at the transmitter and the receiver. We characterize the system energy as a function of different QoS and channel state estimation error parameters. The optimization problem is formulated using Markov chain framework and solved using stochastic optimization techniques. The results demonstrate that the parameters characterizing the packet loss are tightly coupled and relaxation of one parameter does not benefit the system much if the other constraints are tight. We evaluate the energy-performance tradeoff numerically and show the effect of channel uncertainty on the packet scheduler design
    • …
    corecore