314 research outputs found

    Medium access control for inter-gateway handoff support in multi-hop wireless mesh networks

    Get PDF
    Wireless mesh networks (WMNs) have emerged to be a key wireless technology to support large-scale wireless Internet access. Seamless inter-gateway handoff support is an essential issue to ensure continuous communications in multi-hop WMNs. When the movement of a mobile mesh node (MN) causes its attachment point change in the Internet, the complete handoff process may include two steps: the link-layer handoff and the network-layer handoff. During the network-layer handoff, network- layer signaling packets need to be transmitted between the MN and the Internet via the multi-hop wireless mesh backbone. Due to the multi-hop transmission of network- layer handoff signaling packets, the handoff performance in WMNs can be largely degraded by the long queueing delay and medium access delay at each mesh router, especially when the backbone traffic volume is high. However, this critical issue is ignored in existing handoff solutions of multi-hop WMNs. In addition, the channel contention between data packets and handoff signaling packets is not considered in existing medium access control (MAC) designs. In this research, the seamless handoff support is addressed from a different perspec- tive. By eliminating channel contentions between data and handoff signaling pack- ets, the queueing delay and channel access delay of signaling packets are reduced, while data throughput is maintained. Since various WMNs have different channel resources and hardware cost requirements, four MAC schemes are proposed to im- prove the multi-hop handoff performance in single-channel single-radio, single-channel multi-radio, multi-channel single-radio, and multi-channel multi-radio WMNs. With the proposed MAC schemes, the inter-gateway handoff performance can be improved significantly in multi-hop WMNs

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio

    Performance Evaluation of Connection Admission Control for IEEE 802.16 Networks

    Get PDF
    Quality of Service (QoS) provisioning to the various kinds of network traffic is one of the major design criteria of IEEE 802.16 WiMAX standard. The MAC and physical layers of 802.16 standards are designed to support different types of real time application by providing QoS. Scheduling, Connection Admission Control (CAC) and traffic policing are the major issues to ensure QoS. In standard, scheduling and admission control are kept as open issues. Admission control is the ability of a network to control admission of new traffic based on the availability of resources. As per the specification the CAC considers minimum reserved rate of a connection as an admission criterion, in which the system can admit more connections, but packets of admitted connection may encounter large delays. In this paper average data rate (avg-rate CAC) and maximum sustained rate (max-rate CAC) of the connections are considered as admission criteria in CAC, along with minimum reserved rate (min-rate CAC). The performance of the WiMAX network is evaluated and compared for min-rate, avg-rate and max-rate CAC by considering the performance metrics such as number of connections admitted, throughput and delay using QualNet simulation tool

    Spectrum sharing security and attacks in CRNs: a review

    Get PDF
    Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundament al approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR - specific security mechanisms are presented with some open research issues and challenges

    Intelligent Approaches for Routing Protocols In Cognitive Ad-Hoc Networks

    Get PDF
    This dissertation describes the CogNet architecture and five cognitive routing protocols designed to function within this architecture. In this document, I first provide detailed modeling and analysis of CogNet architecture and then provide the detailed approach, mathematical analysis, and simulation results for each of the developed cognitive routing protocols. The fundamental idea for these cognitive routing protocols is that a proper and adaptive network topology should be constructed from network nodes based on predictions using cognitive functions and past experience. The nodes in the cognitive radio network employ machine learning techniques to use past experience and make wise decisions by predicting future network conditions. The cognitive protocol architecture is a cross-layer optimized construct where the lower layer knowledge of the wireless medium is shared with the network layer. This dissertation investigates several intelligent approaches for cognitive routing protocols, such as the multi-channel optimized approach, the scalability optimized cognitive approach, the multi-path optimized approach, and the mobility optimized approach. Analytical and simulation results demonstrate that network performance can be increased significantly by applying cognitive routing protocols

    Vertical Handoff between 802.11 and 802.16 Wireless Access Networks

    Get PDF
    Heterogeneous wireless networks will be dominant in the next-generation wireless networks with the integration of various wireless access networks. Wireless mesh networks will become to a key technology as an economically viable solution for wide deployment of high speed, scalable and ubiquitous wireless Internet services. In this thesis, we consider an interworking architecture of wireless mesh backbone and propose an effective vertical handoff scheme between 802.11 and 802.16 wireless access networks. The proposed vertical handoff scheme aims at reducing handoff signaling overhead on the wireless backbone and providing a low handoff delay to mobile nodes. The handoff signaling procedure in different scenarios is discussed. Together with call admission control, the vertical handoff scheme directs a new call request in the 802.11 network to the 802.16 network, if the admission of the new call in the 802.11 network can degrade quality-of-service (QoS) of the existing real-time traffic flows. Simulation results demonstrate the performance of the handoff scheme with respect to signaling cost, handoff delay, and QoS support

    Mobility Management and Congestion Control in Wireless Mesh Networks

    Get PDF
    Today, wireless mesh networks are increasingly popular. In order to be better adapted to the increasing number of offered services in telecommunications, many Quality of Service (QoS) problems are being considered. Some of the important issues are: admission control, congestion control, and handoff management of the network. Our research focuses on those issues individually and combining them together in order to find solutions to enhance the quality of service provided to each user as demanded in their SLA. A novel Markov Decision-based Admission Control and Routing (MDACR) algorithm is proposed. The MDACR algorithm finds a sub-optimal solution using the value iteration method. Admission rate increases for both types of user associations (handoff and new user association request), which is addressed by a proposed multi-homing admission and routing algorithm. This algorithm associates the user with two different access points. This is beneficial in a highly congested network, which permits a new routing metric to assure seamless handoff in the network. When a user is moving, MDACR algorithm finds a maximally jointed route with the old route, which decreases the handoff delay. Another aspect is considered in order to improve the QoS in WMN, which is the congestion control, a novel proactive approach is proposed. Where a Variable Order Markov (VOM) prediction model is introduced to predict the congestion status in each link in the network, a new route is established for the traffic based on the output of the VOM model, and the transmission rate is adjusted based on the link congestion status to increase the overall user satisfaction. Sub-optimal model is introduced and solved using Lagrange method. Based on the predicted link congestion, rerouting algorithm is implemented in order to insure load balancing and to mitigate congestion over WMN network. Our ultimate goal is to improve the QoS in WMN by dealing individually with the issues stated above and try to combine them together and provide QoS framework which deals with many types of services
    • …
    corecore