613,050 research outputs found
Wireless Broadcast with Network Coding in Mobile Ad-Hoc Networks: DRAGONCAST
Network coding is a recently proposed method for transmitting data, which has
been shown to have potential to improve wireless network performance. We study
network coding for one specific case of multicast, broadcasting, from one
source to all nodes of the network. We use network coding as a loss tolerant,
energy-efficient, method for broadcast. Our emphasis is on mobile networks. Our
contribution is the proposal of DRAGONCAST, a protocol to perform network
coding in such a dynamically evolving environment. It is based on three
building blocks: a method to permit real-time decoding of network coding, a
method to adjust the network coding transmission rates, and a method for
ensuring the termination of the broadcast. The performance and behavior of the
method are explored experimentally by simulations; they illustrate the
excellent performance of the protocol
Anonymous transmission in a noisy quantum network using the W state
We consider the task of anonymously transmitting a quantum message in a
network. We present a protocol that accomplishes this task using the W state
and we analyze its performance in a quantum network where some form of noise is
present. We then compare the performance of our protocol with some of the
existing protocols developed for the task of anonymous transmission. We show
that, in many regimes, our protocol tolerates more noise and achieves higher
fidelities of the transmitted quantum message than the other ones. Furthermore,
we demonstrate that our protocol tolerates one non-responsive node. We prove
the security of our protocol in a semi-active adversary scenario, meaning that
we consider an active adversary and a trusted source.Comment: 9 + 12 pages, 9 figure
Analysis of DoS Attacks at MAC Layer in Mobile Adhoc Networks
—Wireless network security has received tremendous attention due to the vulnerabilities exposed in the open communication medium. The most common wireless Medium Access Control (MAC) protocol is IEEE 802.11, which assumes all the nodes in the network are cooperative. However, nodes may purposefully misbehave in order to disrupt network performance, obtain extra bandwidth and conserve resources. These MAC layer misbehaviours can lead to Denial of Service (DoS) attacks which can disrupt the network operation. There is a lack of comprehensive analysis of MAC layer misbehaviour driven DoS attacks for the IEEE 802.11 protocol. This research studied possible MAC layer DoS attack strategies that are driven by the MAC layer malicious/selfish nodes and investigates the performance of the IEEE 802.11 protocol. Such DoS attacks caused by malicious and selfish nodes violating backoff timers associated with the protocol. The experimental and analytical approach evaluates several practical MAC layer backoff value manipulation and the impact of such attacks on the network performance and stability in MANETs. The simulation results show that introducing DoS attacks at MAC layer could significantly affect the network throughput and data packet collision rate. This paper concludes that DoS attacks with selfish/malicious intend can obtain a larger throughput by denying well-behaved nodes to obtain deserved throughput, also DoS attacks with the intend of complete destruction of the network can succee
Power Switching Protocol for Two-way Relaying Network under Hardware Impairments
In this paper, we analyze the impact of hardware impairments at relay node and source node (i.e. imperfect nodes) on network performance by evaluating outage probability based on the effective signal to noise and distortion ratio (SNDR). Especially, we propose energy harvesting protocol at the relay and source nodes, namely, power switching imperfect relay (PSIR) and power switching imperfect source (PSIS). Aiming to determine the performance of energy constrained network, we first derive closed-form expressions of the outage probability and then the throughput can be maximized in delay-limited transmission mode. The simulation results provide practical insights into the impacts of hardware impairments and power switching factors of the energy harvesting protocol on the performance of energy harvesting enabled two-way relaying network
Bootstrapping opportunistic networks using social roles
Opportunistic routing protocols can enable message delivery in disconnected networks of mobile devices. To conserve energy in mobile environments, such routing protocols must minimise unnecessary message-forwarding. This paper presents an opportunistic routing protocol that leverages social role information. We compute node roles from a social network graph to identify nodes with similar contact relationships, and use these roles to determine routing decisions. By using pre-existing social network information, such as online social network friends, to determine roles, we show that our protocol can bootstrap a new opportunistic network without the delay incurred by encounter-history-based routing protocols such as SimbetTS. Simulations with four real-world datasets show improved performance over SimbetTS, with performance approaching Epidemic routing in some scenarios.Postprin
- …