613,050 research outputs found

    Wireless Broadcast with Network Coding in Mobile Ad-Hoc Networks: DRAGONCAST

    Get PDF
    Network coding is a recently proposed method for transmitting data, which has been shown to have potential to improve wireless network performance. We study network coding for one specific case of multicast, broadcasting, from one source to all nodes of the network. We use network coding as a loss tolerant, energy-efficient, method for broadcast. Our emphasis is on mobile networks. Our contribution is the proposal of DRAGONCAST, a protocol to perform network coding in such a dynamically evolving environment. It is based on three building blocks: a method to permit real-time decoding of network coding, a method to adjust the network coding transmission rates, and a method for ensuring the termination of the broadcast. The performance and behavior of the method are explored experimentally by simulations; they illustrate the excellent performance of the protocol

    Anonymous transmission in a noisy quantum network using the W state

    Full text link
    We consider the task of anonymously transmitting a quantum message in a network. We present a protocol that accomplishes this task using the W state and we analyze its performance in a quantum network where some form of noise is present. We then compare the performance of our protocol with some of the existing protocols developed for the task of anonymous transmission. We show that, in many regimes, our protocol tolerates more noise and achieves higher fidelities of the transmitted quantum message than the other ones. Furthermore, we demonstrate that our protocol tolerates one non-responsive node. We prove the security of our protocol in a semi-active adversary scenario, meaning that we consider an active adversary and a trusted source.Comment: 9 + 12 pages, 9 figure

    Analysis of DoS Attacks at MAC Layer in Mobile Adhoc Networks

    Get PDF
    —Wireless network security has received tremendous attention due to the vulnerabilities exposed in the open communication medium. The most common wireless Medium Access Control (MAC) protocol is IEEE 802.11, which assumes all the nodes in the network are cooperative. However, nodes may purposefully misbehave in order to disrupt network performance, obtain extra bandwidth and conserve resources. These MAC layer misbehaviours can lead to Denial of Service (DoS) attacks which can disrupt the network operation. There is a lack of comprehensive analysis of MAC layer misbehaviour driven DoS attacks for the IEEE 802.11 protocol. This research studied possible MAC layer DoS attack strategies that are driven by the MAC layer malicious/selfish nodes and investigates the performance of the IEEE 802.11 protocol. Such DoS attacks caused by malicious and selfish nodes violating backoff timers associated with the protocol. The experimental and analytical approach evaluates several practical MAC layer backoff value manipulation and the impact of such attacks on the network performance and stability in MANETs. The simulation results show that introducing DoS attacks at MAC layer could significantly affect the network throughput and data packet collision rate. This paper concludes that DoS attacks with selfish/malicious intend can obtain a larger throughput by denying well-behaved nodes to obtain deserved throughput, also DoS attacks with the intend of complete destruction of the network can succee

    Power Switching Protocol for Two-way Relaying Network under Hardware Impairments

    Get PDF
    In this paper, we analyze the impact of hardware impairments at relay node and source node (i.e. imperfect nodes) on network performance by evaluating outage probability based on the effective signal to noise and distortion ratio (SNDR). Especially, we propose energy harvesting protocol at the relay and source nodes, namely, power switching imperfect relay (PSIR) and power switching imperfect source (PSIS). Aiming to determine the performance of energy constrained network, we first derive closed-form expressions of the outage probability and then the throughput can be maximized in delay-limited transmission mode. The simulation results provide practical insights into the impacts of hardware impairments and power switching factors of the energy harvesting protocol on the performance of energy harvesting enabled two-way relaying network

    Bootstrapping opportunistic networks using social roles

    Get PDF
    Opportunistic routing protocols can enable message delivery in disconnected networks of mobile devices. To conserve energy in mobile environments, such routing protocols must minimise unnecessary message-forwarding. This paper presents an opportunistic routing protocol that leverages social role information. We compute node roles from a social network graph to identify nodes with similar contact relationships, and use these roles to determine routing decisions. By using pre-existing social network information, such as online social network friends, to determine roles, we show that our protocol can bootstrap a new opportunistic network without the delay incurred by encounter-history-based routing protocols such as SimbetTS. Simulations with four real-world datasets show improved performance over SimbetTS, with performance approaching Epidemic routing in some scenarios.Postprin
    corecore