33 research outputs found

    Enhancing Reliability of Tactical MANETs by Improving Routing Decisions

    Get PDF
    Mobile ad-hoc networks (MANETs) have been primarily designed to enhance tactical communications in a battlefield. They provide dynamic connectivity without requiring any pre-existing infrastructure. Their multi-hop capabilities can improve radio coverage significantly. The nature of tactical MANET operations requires more specialized routing protocols compared to theones which are used in commercial MANET. Routing decisions in MANETs are usually conditionedon signal-to-interference-plus-noise ratio (SINR) measurements. In order to improve routing decisions for use in highly dynamic tactical MANETs, this paper proposes to combine two different metrics to achieve reliable multicast in multi-hop ad hoc networks. The resulting protocol combining received signal strength (RSS) with SINR to make routing decisions is referred to as Link Quality Aware Ad-hoc On-Demand Distance Vector (LQA-AODV) routing. The proposed routing protocol can quickly adapt to dynamic changes in network topology and link quality variations often encountered in tactical field operations. Using computer simulations, the performance of proposed protocol is shown to outperform other widely used reactive routing protocols assuming several performance metrics

    A Novel Communication Approach For Wireless Mobile Smart Objects

    Get PDF
    Tez (Doktora) -- İstanbul Teknik Üniversitesi, Fen Bilimleri Enstitüsü, 2007Thesis (PhD) -- İstanbul Technical University, Institute of Science and Technology, 2007Telsiz ağlar gezgin kullanıcılara nerede olduklarına bağlı olmadan her yerde iletişim kurma ve bilgiye erişim imkanı sağlar. Hiçbir sabit altyapıya gerek duymadan bu imkanı sağlayan tasarsız ağların zaman içinde gelişmesiyle, askeri, ticari ve özel maksatlar için tercih edilir hale gelmiştir. Diğer yandan, bilimsel ve teknolojik gelişmeler ağ elemanlarını daha küçük ve ucuz hale getirdikçe birçok uygulamanın vazgeçilmez parçaları olmuşlardır. Bu ağ elemanları, taşıyıcılara (örneğin gemiler, uçaklar, büyük araçlar, arabalar, insanlar, hayvanlar, vb.) monteli nesneler veya kendi taşıyıcısı olan (aktörler, duyargalar) nesneler olabilir. Fakat bu ağ elemanları ve uygulamalarında bir takım zorluklar yaşanmaktadır. Bu tezde, gezgin tasarsız ve duyarga ağlardaki yaşanan zorlukları ve beklentileri dikkate alarak, gezgin tasarsız ve duyarga ağlar için yeni bir özgün, durumsuz veri akış yaklaşımı ve yönlendirme algoritması önerilmektedir. Durumsuz Ağırlıklı Yönlendirme (DAY, “Stateless Weighted Routing – SWR”) algoritması olarak adlandırdığımız bu algoritma, diğer yöntemlere göre daha az yönlendirme yükü, daha az enerji tüketimi, daha az yol oluşturma gecikmesi sağlamaktadır. Veri, varışa doğru, çoklu yollar üzerinden taşınmaktadır. Çoklu yol oluşturma, güvenirliği sağlamakta, boşluk problemini büyük oranda çözmekte ve en kısa yolu da içeren daha gürbüz yollar oluşmasını sağlamaktadır. DAY aynı zamanda büyük ölçekli ağlarda da uygulanabilir. Bu amaçla, birden fazla veri toplanma düğümü (sink) içeren sürümü olan Çoklu Veri Toplanma Düğümlü- Durumsuz Ağırlıklı Yönlendirme (ÇVTD-DAY - “Multiple Sink-Stateless Weighted Routing - MS-SWR”) yöntemi de büyük ölçekli tasarsız ve duyarga ağları için önerilmiştir. ÇVTD-DAY yöntemi, DAY yönteminde herhangi bir yöntemsel ve algoritmik değişiklik yapmadan birden fazla veri toplanma düğümünün olduğu ağlarda uygulanabilir. Hem DAY, hem ÇVTD-DAY’nin başarımı benzetimler ile ölçüldü. Elde edilen sonuçlar, DAY ‘nin gezgin tasarsız ve duyarga ağlar için istenenleri karşıladığını, karşılaştırılan diğer yöntemlere göre üstün olduğunu ve olası en iyi çözüme yakınlığını, öte yandan ÇVTD-DAY‘nin de büyük ölçekli ağlarda uygulanabilir olduğunu göstermektedir.Wireless networks provide mobile user with ubiquitous communication capability and information access regardless of location. Mobile ad hoc networks, that manage it without a need to infrastructure networks, as evolved in time, become more preferable for military, commercial and special purposes. On the other hand, technological advances made network components smaller and cheaper. These network components involves a wide variety of objects such as objects mounted on crafts/platforms (e.g. ships, aircrafts, trucks, cars, humans, animals), and objects that have their own platforms (e.g. actuators, sensor nodes). However, these network components and their involved applications exhibit some challenges to implement. By considering the challenges and expectations of mobile ad hoc networks and sensor network, we propose a novel stateless data flow approach and routing algorithm namely Stateless Weighted Routing (SWR) for mobile ad hoc and sensor networks. The SWR has low routing overhead providing very low energy consumption, and has low route construction delay than other proposed schemes. Multiple paths to the destination are established for data transmission. Constructing multiple paths provides reliability, eliminates the void problem substantially, and provides more robust routes including the shortest path. The SWR is applicable to large scale networks. We propose the multiple-sink version of the SWR that is namely MS-SWR, to be used in large scale ad hoc and sensor networks with multiple sinks. The MS-SWR can be used with multiple sinks without any functional and algorithmic modification in the SWR protocol. The performance of the SWR and the MS-SWR are evaluated by simulations. The performance of the system shows that the SWR satisfies the requirements of mobile ad hoc networks and outperforms the existing algorithms. The SWR is also tested against a hypothetic routing scheme that finds the shortest available path with no cost in order to compare the performance of the SWR against such an ideal case. Tests also indicate that MS-SWR is scalable for large scale networks.DoktoraPh

    Mobile Ad-Hoc Networks

    Get PDF
    Being infrastructure-less and without central administration control, wireless ad-hoc networking is playing a more and more important role in extending the coverage of traditional wireless infrastructure (cellular networks, wireless LAN, etc). This book includes state-of the-art techniques and solutions for wireless ad-hoc networks. It focuses on the following topics in ad-hoc networks: vehicular ad-hoc networks, security and caching, TCP in ad-hoc networks and emerging applications. It is targeted to provide network engineers and researchers with design guidelines for large scale wireless ad hoc networks

    Smart Sensor Technologies for IoT

    Get PDF
    The recent development in wireless networks and devices has led to novel services that will utilize wireless communication on a new level. Much effort and resources have been dedicated to establishing new communication networks that will support machine-to-machine communication and the Internet of Things (IoT). In these systems, various smart and sensory devices are deployed and connected, enabling large amounts of data to be streamed. Smart services represent new trends in mobile services, i.e., a completely new spectrum of context-aware, personalized, and intelligent services and applications. A variety of existing services utilize information about the position of the user or mobile device. The position of mobile devices is often achieved using the Global Navigation Satellite System (GNSS) chips that are integrated into all modern mobile devices (smartphones). However, GNSS is not always a reliable source of position estimates due to multipath propagation and signal blockage. Moreover, integrating GNSS chips into all devices might have a negative impact on the battery life of future IoT applications. Therefore, alternative solutions to position estimation should be investigated and implemented in IoT applications. This Special Issue, “Smart Sensor Technologies for IoT” aims to report on some of the recent research efforts on this increasingly important topic. The twelve accepted papers in this issue cover various aspects of Smart Sensor Technologies for IoT

    Formal modelling and analysis of denial of services attacks in wireless sensor networks

    Get PDF
    Wireless Sensor Networks (WSNs) have attracted considerable research attention in recent years because of the perceived potential benefits offered by self-organising, multi-hop networks consisting of low-cost and small wireless devices for monitoring or control applications in di±cult environments. WSN may be deployed in hostile or inaccessible environments and are often unattended. These conditions present many challenges in ensuring that WSNs work effectively and survive long enough to fulfil their functionalities. Securing a WSN against any malicious attack is a particular challenge. Due to the limited resources of nodes, traditional routing protocols are not appropriate in WSNs and innovative methods are used to route data from source nodes to sink nodes (base stations). To evaluate the routing protocols against DoS attacks, an innovative design method of combining formal modelling and computer simulations has been proposed. This research has shown that by using formal modelling hidden bugs (e.g. vulnerability to attacks) in routing protocols can be detected automatically. In addition, through a rigorous testing, a new routing protocol, RAEED (Robust formally Analysed protocol for wirEless sEnsor networks Deployment), was developed which is able to operate effectively in the presence of hello flood, rushing, wormhole, black hole, gray hole, sink hole, INA and jamming attacks. It has been proved formally and using computer simulation that the RAEED can pacify these DoS attacks. A second contribution of this thesis relates to the development of a framework to check the vulnerability of different routing protocols against Denial of Service(DoS) attacks. This has allowed us to evaluate formally some existing and known routing protocols against various DoS attacks iand these include TinyOS Beaconing, Authentic TinyOS using uTesla, Rumour Routing, LEACH, Direct Diffusion, INSENS, ARRIVE and ARAN protocols. This has resulted in the development of an innovative and simple defence technique with no additional hardware cost for deployment against wormhole and INA attacks. In the thesis, the detection of weaknesses in INSENS, Arrive and ARAN protocols was also addressed formally. Finally, an e±cient design methodology using a combination of formal modelling and simulation is propose to evaluate the performances of routing protocols against DoS attacks

    Hybrid satellite–terrestrial networks toward 6G : key technologies and open issues

    Get PDF
    Future wireless networks will be required to provide more wireless services at higher data rates and with global coverage. However, existing homogeneous wireless networks, such as cellular and satellite networks, may not be able to meet such requirements individually, especially in remote terrain, including seas and mountains. One possible solution is to use diversified wireless networks that can exploit the inter-connectivity between satellites, aerial base stations (BSs), and terrestrial BSs over inter-connected space, ground, and aerial networks. Hence, enabling wireless communication in one integrated network has attracted both the industry and the research fraternities. In this work, we provide a comprehensive survey of the most recent work on hybrid satellite–terrestrial networks (HSTNs), focusing on system architecture, performance analysis, design optimization, and secure communication schemes for different cooperative and cognitive HSTN network architectures. Different key technologies are compared. Based on this comparison, several open issues for future research are discussed

    Optimization and Communication in UAV Networks

    Get PDF
    UAVs are becoming a reality and attract increasing attention. They can be remotely controlled or completely autonomous and be used alone or as a fleet and in a large set of applications. They are constrained by hardware since they cannot be too heavy and rely on batteries. Their use still raises a large set of exciting new challenges in terms of trajectory optimization and positioning when they are used alone or in cooperation, and communication when they evolve in swarm, to name but a few examples. This book presents some new original contributions regarding UAV or UAV swarm optimization and communication aspects
    corecore