14,696 research outputs found
RECOMAC: a cross-layer cooperative network protocol for wireless ad hoc networks
A novel decentralized cross-layer multi-hop cooperative protocol, namely, Routing Enabled Cooperative Medium Access Control (RECOMAC) is proposed for wireless ad hoc networks. The protocol architecture makes use of cooperative
forwarding methods, in which coded packets are forwarded via opportunistically formed cooperative sets within a region, as RECOMAC spans the physical, medium access control (MAC) and routing layers. Randomized coding is exploited at the physical layer to realize cooperative transmissions, and cooperative forwarding is implemented for routing functionality, which is submerged into the MAC layer, while the overhead for MAC and route set up is minimized. RECOMAC is shown to provide dramatic performance improvements of eight times higher throughput and one tenth of end-to-end delay than that of the conventional architecture in practical wireless mesh networks
Efficient Packet Forwarding in Mesh Network
Wireless Mesh Network (WMN) is a multi hop low cost, with easy maintenance
robust network providing reliable service coverage. WMNs consist of mesh
routers and mesh clients. In this architecture, while static mesh routers form
the wireless backbone, mesh clients access the network through mesh routers as
well as directly meshing with each other. Different from traditional wireless
networks, WMN is dynamically self-organized and self-configured. In other
words, the nodes in the mesh network automatically establish and maintain
network connectivity. Over the years researchers have worked, to reduce the
redundancy in broadcasting packet in the mesh network in the wireless domain
for providing reliable service coverage, the source node deserves to broadcast
or flood the control packets. The redundant control packet consumes the
bandwidth of the wireless medium and significantly reduces the average
throughput and consequently reduces the overall system performance. In this
paper I study the optimization problem in Wireless Mesh Networks. We have
proposed a novel approach to reduce the broadcast redundant packet in the
wireless mesh network. Also we have shown, a novel procedure to forward the
control packet to the destination nodes and efficiently minimize the
transmitted control packet in the wireless mesh cloud, that covers the domain.Comment: 4 pages, 6 figure
Energy-efficient multi-criteria packet forwarding in multi-hop wireless networks
Reliable multi-hop packet forwarding is an important requirement for the implementation of realistic large-scale wireless ad-hoc networks. However, packet forwarding methods based on a single criterion, such as the traditional greedy geographic forwarding, are not sufficient in most realistic wireless settings because perfect-reception-within-rangecannot be assumed. Furthermore, methods where the selection of intermediate relaying nodes is performed at the transmitter-side do not adapt well to rapidly changing network environments. Although a few link-aware geographic forwarding schemes have been reported in the literature, the tradeoffs between multiple decision criteria and their impact on network metrics such as throughput, delay and energy consumption have not been studied.
This dissertation presents a series of strategies aimed at addressing the challenges faced by the choice of relay nodes in error-prone dynamic wireless network environments. First, a single-criterion receiver-side relay election (RSRE) is introduced as a distributed alternative to the traditional transmitter-side relay selection. Contrary to the transmitter- side selection, at each hop, an optimal node is elected among receivers to relay packets toward the destination. Next, a multi-criteria RSRE, which factors multiple decision criteria in the election process at lower overhead cost, is proposed. A general cost metric in the form of a multi-parameter mapping function aggregates decision criteria into a single metric used to rank potential relay candidates. A two-criteria RSRE case study shows that a proper combination of greedy forwarding and link quality leads to higher energy efficiency and substantial improvement in the end-to-end delay. Last, mesh multi-path forwarding methods are examined. A generalized mesh construction algorithm in introduced to show impact of a mesh structure on network performance
Secure Routing in Wireless Mesh Networks
Wireless mesh networks (WMNs) have emerged as a promising concept to meet the
challenges in next-generation networks such as providing flexible, adaptive,
and reconfigurable architecture while offering cost-effective solutions to the
service providers. Unlike traditional Wi-Fi networks, with each access point
(AP) connected to the wired network, in WMNs only a subset of the APs are
required to be connected to the wired network. The APs that are connected to
the wired network are called the Internet gateways (IGWs), while the APs that
do not have wired connections are called the mesh routers (MRs). The MRs are
connected to the IGWs using multi-hop communication. The IGWs provide access to
conventional clients and interconnect ad hoc, sensor, cellular, and other
networks to the Internet. However, most of the existing routing protocols for
WMNs are extensions of protocols originally designed for mobile ad hoc networks
(MANETs) and thus they perform sub-optimally. Moreover, most routing protocols
for WMNs are designed without security issues in mind, where the nodes are all
assumed to be honest. In practical deployment scenarios, this assumption does
not hold. This chapter provides a comprehensive overview of security issues in
WMNs and then particularly focuses on secure routing in these networks. First,
it identifies security vulnerabilities in the medium access control (MAC) and
the network layers. Various possibilities of compromising data confidentiality,
data integrity, replay attacks and offline cryptanalysis are also discussed.
Then various types of attacks in the MAC and the network layers are discussed.
After enumerating the various types of attacks on the MAC and the network
layer, the chapter briefly discusses on some of the preventive mechanisms for
these attacks.Comment: 44 pages, 17 figures, 5 table
Detection techniques of selective forwarding attacks in wireless sensor networks: a survey
The wireless sensor network has become a hot research area due its wide range
of application in military and civilian domain, but as it uses wireless media
for communication these are easily prone to security attacks. There are number
of attacks on wireless sensor networks like black hole attack, sink hole
attack, Sybil attack, selective forwarding attacks etc. in this paper we will
concentrate on selective forwarding attacks In selective forwarding attacks,
malicious nodes behave like normal nodes and selectively drop packets. The
selection of dropping nodes may be random. Identifying such attacks is very
difficult and sometimes impossible. In this paper we have listed up some
detection techniques, which have been proposed by different researcher in
recent years, there we also have tabular representation of qualitative analysis
of detection techniquesComment: 6 Page
- …