2,027 research outputs found
A cross layer multi hop network architecture for wireless Ad Hoc networks
In this paper, a novel decentralized cross-layer multi-hop cooperative network architecture is presented. Our architecture involves the design of a simple yet efficient cooperative flooding scheme,two decentralized opportunistic cooperative forwarding mechanisms as well as the design of Routing
Enabled Cooperative Medium Access Control (RECOMAC) protocol that spans and incorporates the physical, medium access control (MAC) and routing layers for improving the performance of multihop communication. The proposed architecture exploits randomized coding at the physical layer to realize cooperative diversity. Randomized coding alleviates relay selection and actuation mechanisms,and therefore reduces the coordination among the relays. The coded packets are forwarded via opportunistically formed cooperative sets within a region, without communication among the relays and without establishing a prior route. In our architecture, routing layer functionality is submerged into the
MAC layer to provide seamless cooperative communication while the messaging overhead to set up routes, select and actuate relays is minimized. RECOMAC is shown to provide dramatic performance improvements, such as eight times higher throughput and ten times lower end-to-end delay as well as reduced overhead, as compared to networks based on well-known IEEE 802.11 and Ad hoc On Demand
Distance Vector (AODV) protocols
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
SDDV: scalable data dissemination in vehicular ad hoc networks
An important challenge in the domain of vehicular ad hoc networks (VANET) is the scalability of data dissemination. Under dense traffic conditions, the large number of communicating vehicles can easily result in a congested wireless channel. In that situation, delays and packet losses increase to a level where the VANET cannot be applied for road safety applications anymore. This paper introduces scalable data dissemination in vehicular ad hoc networks (SDDV), a holistic solution to this problem. It is composed of several techniques spread across the different layers of the protocol stack. Simulation results are presented that illustrate the severity of the scalability problem when applying common state-of-the-art techniques and parameters. Starting from such a baseline solution, optimization techniques are gradually added to SDDV until the scalability problem is entirely solved. Besides the performance evaluation based on simulations, the paper ends with an evaluation of the final SDDV configuration on real hardware. Experiments including 110 nodes are performed on the iMinds w-iLab.t wireless lab. The results of these experiments confirm the results obtained in the corresponding simulations
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Connectivity is a critical issue in WSNs, as the data collected needs to be sent to the base station or the processing centers. Low connectivity due to the limited radio range of sensor nodes and random distribution leads the network to be partitioned into disconnected groups, which can interrupt or completely prevent communication between nodes. For effective communication, each node must be located close enough to each other. Improper positioning of the nodes can cause a failure in sending or receiving radio signals, resulting in a segmented or incomplete network. A Multi-Hop Selective Constructive Interference Flooding (MSCIF) protocol is proposed to address the problem of low connectivity in WSNs with a sparse distribution and improve the network’s lifetime. MSCIF integrates three main algorithms: clustering algorithm, selection algorithm, and a synchronized flooding. The first step of the proposed protocol involves the development of an energy efficient clustering algorithm which is appropriate for WSN with a sparse density topology. Clustering is necessary in the proposed protocol as it helps to exclude nodes that are far away from other nodes, which consume a lot of energy. The stages of clustering are: initialization, scheduling, and clustering. The second step in MSCIF protocol involves designing a selection algorithm to select the minimum connected dominating nodes. This is to improve the network reliability and control the energy consumption by reducing the number of cooperating nodes. The third step is applying a fast-synchronized flooding to achieve a constructive interference at the receiver to improve the received signal strength and improve connectivity
BAN-GZKP: Optimal Zero Knowledge Proof based Scheme for Wireless Body Area Networks
BANZKP is the best to date Zero Knowledge Proof (ZKP) based secure
lightweight and energy efficient authentication scheme designed for Wireless
Area Network (WBAN). It is vulnerable to several security attacks such as the
replay attack, Distributed Denial-of-Service (DDoS) attacks at sink and
redundancy information crack. However, BANZKP needs an end-to-end
authentication which is not compliant with the human body postural mobility. We
propose a new scheme BAN-GZKP. Our scheme improves both the security and
postural mobility resilience of BANZKP. Moreover, BAN-GZKP uses only a
three-phase authentication which is optimal in the class of ZKP protocols. To
fix the security vulnerabilities of BANZKP, BAN-GZKP uses a novel random key
allocation and a Hop-by-Hop authentication definition. We further prove the
reliability of our scheme to various attacks including those to which BANZKP is
vulnerable. Furthermore, via extensive simulations we prove that our scheme,
BAN-GZKP, outperforms BANZKP in terms of reliability to human body postural
mobility for various network parameters (end-to-end delay, number of packets
exchanged in the network, number of transmissions). We compared both schemes
using representative convergecast strategies with various transmission rates
and human postural mobility. Finally, it is important to mention that BAN-GZKP
has no additional cost compared to BANZKP in terms memory, computational
complexity or energy consumption
Algorithmic Aspects of Energy-Delay Tradeoff in Multihop Cooperative Wireless Networks
We consider the problem of energy-efficient transmission in delay constrained
cooperative multihop wireless networks. The combinatorial nature of cooperative
multihop schemes makes it difficult to design efficient polynomial-time
algorithms for deciding which nodes should take part in cooperation, and when
and with what power they should transmit. In this work, we tackle this problem
in memoryless networks with or without delay constraints, i.e., quality of
service guarantee. We analyze a wide class of setups, including unicast,
multicast, and broadcast, and two main cooperative approaches, namely: energy
accumulation (EA) and mutual information accumulation (MIA). We provide a
generalized algorithmic formulation of the problem that encompasses all those
cases. We investigate the similarities and differences of EA and MIA in our
generalized formulation. We prove that the broadcast and multicast problems
are, in general, not only NP hard but also o(log(n)) inapproximable. We break
these problems into three parts: ordering, scheduling and power control, and
propose a novel algorithm that, given an ordering, can optimally solve the
joint power allocation and scheduling problems simultaneously in polynomial
time. We further show empirically that this algorithm used in conjunction with
an ordering derived heuristically using the Dijkstra's shortest path algorithm
yields near-optimal performance in typical settings. For the unicast case, we
prove that although the problem remains NP hard with MIA, it can be solved
optimally and in polynomial time when EA is used. We further use our algorithm
to study numerically the trade-off between delay and power-efficiency in
cooperative broadcast and compare the performance of EA vs MIA as well as the
performance of our cooperative algorithm with a smart noncooperative algorithm
in a broadcast setting.Comment: 12 pages, 9 figure
- …