89 research outputs found

    Quality of service based distributed control of wireless networks

    Get PDF

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio

    Quantifying Potential Energy Efficiency Gain in Green Cellular Wireless Networks

    Full text link
    Conventional cellular wireless networks were designed with the purpose of providing high throughput for the user and high capacity for the service provider, without any provisions of energy efficiency. As a result, these networks have an enormous Carbon footprint. In this paper, we describe the sources of the inefficiencies in such networks. First we present results of the studies on how much Carbon footprint such networks generate. We also discuss how much more mobile traffic is expected to increase so that this Carbon footprint will even increase tremendously more. We then discuss specific sources of inefficiency and potential sources of improvement at the physical layer as well as at higher layers of the communication protocol hierarchy. In particular, considering that most of the energy inefficiency in cellular wireless networks is at the base stations, we discuss multi-tier networks and point to the potential of exploiting mobility patterns in order to use base station energy judiciously. We then investigate potential methods to reduce this inefficiency and quantify their individual contributions. By a consideration of the combination of all potential gains, we conclude that an improvement in energy consumption in cellular wireless networks by two orders of magnitude, or even more, is possible.Comment: arXiv admin note: text overlap with arXiv:1210.843

    A Feedback Approach for QoS-Enhanced MAC in Wireless Sensor Network

    Get PDF
    WSN as well as Wireless Multimedia Sensor Network (WMSN) has demands for QoS provision and differentiated service. The various types of data, such as video, voice, and network management, need to be periodically or best-effect transmitted. Since MAC layer forces the final physical medium accessing, it is the best choice to implement the QoS support for efficiency. This paper addresses the problem of QoS support in WSN from a renewed view of control theory and proposes FD-MAC architecture. By means of CSMA/CA, FD-MAC dynamically adjusts contention widow size according to the MAC frames’ priorities and their actual QoS metrics. The architecture can be modeled as a linear time-invariant system by system identification, and Least-Beat controller is designed to drive the system output to the desired value, which means the ratio of actual QoS metrics can be controlled to a prefixed value. The higher priorities enjoy a comparatively lower node-to-node delay while the lower priorities can still operate without being oversacrificed

    Feasibility of Using Passive Monitoring Techniques in Mesh Networks for the Support of Routing

    Get PDF
    In recent years, Wireless Mesh Networks (WMNs) have emerged as a promising solution to provide low cost access networks that extend Internet access and other networking services. Mesh routers form the backbone connectivity through cooperative routing in an often unstable wireless medium. Therefore, the techniques used to monitor and manage the performance of the wireless network are expected to play a significant role in providing the necessary performance metrics to help optimize the link performance in WMNs. This thesis initially presents an assessment of the correlation between passive monitoring and active probing techniques used for link performance measurement in single radio WMNs. The study reveals that by combining multiple performance metrics obtained by using passive monitoring, a high correlation with active probing can be achieved. The thesis then addresses the problem of the system performance degradation associated with simultaneous activation of multiple radios within a mesh node in a multi-radio environment. The experiments results suggest that the finite computing resource seems to be the limiting factor in the performance of a multi-radio mesh network. Having studied this characteristic of multi-radio networks, a similar approach as used in single radio mesh network analysis was taken to investigate the feasibility of passive monitoring in a multi-radio environment. The accuracy of the passive monitoring technique was compared with that of the active probing technique and the conclusion reached is that passive monitoring is a viable alternative to active probing technique in multi-radio mesh networks

    Control-theoretic adaptive mechanisms for performance optimization of IEEE 802.11 WLANs: design, implementation and experimental evaluation

    Get PDF
    The media access control (MAC) layer of the IEEE 802.11 standard specifies a set of parameters that regulate the behavior of the wireless stations when accessing the channel. Although the standard defines a set of recommended values for these parameters, they are statically set and do not take into account the current conditions in the wireless local area network (WLAN) in terms of, e.g., number of contending stations and the traffic they generate, which results in suboptimal performance. In this thesis we propose two novel control theoretic approaches to optimally configure the WLAN parameters based on the dynamically observed network conditions: a Centralized Adaptive Control (CAC) algorithm, whereby the access point (AP) computes the con guration that maximizes performance and signals it to the active stations, and a Distributed Adaptive Control (DAC) algorithm, which is independently employed by each station with the same goal. In contrast to previous proposals, which are mostly based on heuristics, our approaches build upon (i) analytical models of the WLAN performance, used to derive the optimal point of operation of the IEEE 802.11 protocol, and (ii) mathematical foundations from single- and multi-variable control theory, used to design the mechanisms that drive the WLAN to this point of operation. Another key advantage of the proposed algorithms over existing approaches is that they are compliant with the IEEE 802.11 standard and can be implemented with current wireless cards without introducing any modifications into their hardware and/or firmware. We show by means of an exhaustive performance evaluation study that our algorithms maximize the WLAN performance in terms of throughput and delay under a wide set of network conditions, substantially outperforming the standard recommended configuration as well as previous adaptive proposals. Finally, we present our experiences with implementing the proposed adaptive algorithms in a real IEEE 802.11 testbed and discuss the implementation details of the building blocks that comprise these mechanisms. We evaluate their performance by conducting extensive measurements, considering different network conditions in terms of number of nodes, transmission power employed and tra c generated. Based on the obtained results, we provide valuable insights on the performance of the distributed and centralized algorithms and discuss the suitability of these schemes for real deployments. ------------------------------------------------------------------------------------------------------------------------------------------------------------------------El nivel MAC (Media Access Control) del estĂĄndar IEEE 802.11 especifica una serie de parĂĄmetros que definen el comportamiento de las estaciones inalĂĄmbricas cuando acceden al canal. En dicho estĂĄndar se define un conjunto de valores recomendados para estos parĂĄmetros, si bien estos valores, constantes, no tienen en cuenta las condiciones de la red inalĂĄmbrica -en tĂ©rminos de, por ejemplo, nĂșmero de estaciones o trĂĄfico cursado- por lo que resultan en un rendimiento subĂłptimo. En esta tesis se proponen dos nuevos algoritmos para configurar de forma Ăłptima estos parĂĄmetros partiendo de las condiciones observadas de la red. Dichos algoritmos, construidos sobre la base de la teorĂ­a de control, son los siguientes: CAC (Centralized Adaptive Control), que se ejecuta en el punto de acceso, el cual distribuye la configuraciĂłn a usar al resto de estaciones; y DAC (Distributed Adaptive Control), ejecutado por cada estaciĂłn de la red inalĂĄmbrica de forma independiente. A diferencia de las propuestas anteriores, casi todas ellas basada en heurĂ­sticos, los algoritmos se basan en (i) un modelo analĂ­tico del rendimiento de la red inalĂĄmbrica, necesario para obtener el punto de operaciĂłn Ăłptimo de la red; y (ii) fundamentos matemĂĄticos de la teorĂ­a de control mono y multivariable, aplicados para diseñar el mecanismo que lleva la red a dicho punto de operaciĂłn. Otra ventaja de los esquemas propuestos frente al trabajo previo es que son compatibles con el estĂĄndar IEEE 802.11, y pueden ser implementados sobre las tarjetas existentes sin necesidad de cambiar el hardware o el firmware. Mediante una extensa evaluaciĂłn de rendimiento bajo diversas condiciones, se comprueba que los algoritmos maximizan las prestaciones de la red tanto en ancho de banda como en retardo, mejorando notablemente los resultados proporcionados por la configuraciĂłn recomendada en el estĂĄndar asĂ­ como por propuestas dinĂĄmicas anteriores. Por Ășltimo, se presentan las experiencias del prototipado de dichos algoritmos sobre dispositivos IEEE 802.11, discutiendo los detalles de implementaciĂłn de sus diferentes bloques. Se evalĂșan las prestaciones de los mismos mediante una extensa serie de experimentos, incluyendo diferentes escenarios en tĂ©rminos del nĂșmero de nodos, potencia de transmisiĂłn usada y trĂĄfico generado. Los resultados obtenidos permiten extraer valiosas conclusiones sobre el rendimiento de los esquemas adaptativos centralizados y distribuidos, asĂ­ como la viabilidad de su despliegue en escenarios reales

    An Experimental Analysis of the Call Capacity of IEEE 802.11b Wireless Local Area Networks for VoIP Telephony

    Get PDF
    The use of the Internet to make phone calls is growing in popularity as the Voice over Internet protocol (VoIP) allows users to make phone calls virtually free of charge. The increased uptake of broadband services by domestic users will further increase the use of VoIP telephony. Furthermore, the emergence of low cost wireless networks (namely IEEE 802.11a/b/g WLANs) is expected to bring wireless VoIP into the mainstream. As the number of wireless hotspots increases more users will want to use VoIP calls wherever possible by connecting to open access points (AP). A major concern with VoIP is Quality of Service (QoS). In order for VoIP to be truly successful users must enjoy a similar perceived QoS as a call made over a traditional telephone network. There are many factors that influence QoS which include: throughput, packet delay, delay variation (or jitter), and packet loss. This thesis is an experimental study of the call capacity of an IEEE 802.11b network when using VoIP telephony. Experiments included increasing the number of VoIP stations and also increasing the level of background traffic until network saturation occurs. Results show that the network is capable of supporting at least 16 VoIP stations. Due to the operation of the IEEE 802.11 medium access control (MAC) mechanism, the AP acts as a bottleneck for all traffic destined for wireless stations, in that significant delays can be incurred by VoIP packets which can lead to a poor perceived QoS by users. Consequently the performance of the AP downlink is the critical component in determining VoIP call capacity

    Performance analysis and application development of hybrid WiMAX-WiFi IP video surveillance systems

    Get PDF
    Traditional Closed Circuit Television (CCTV) analogue cameras installed in buildings and other areas of security interest necessitates the use of cable lines. However, analogue systems are limited by distance; and storing analogue data requires huge space or bandwidth. Wired systems are also prone to vandalism, they cannot be installed in a hostile terrain and in heritage sites, where cabling would distort original design. Currently, there is a paradigm shift towards wireless solutions (WiMAX, Wi-Fi, 3G, 4G) to complement and in some cases replace the wired system. A wireless solution of the Fourth-Generation Surveillance System (4GSS) has been proposed in this thesis. It is a hybrid WiMAX-WiFi video surveillance system. The performance analysis of the hybrid WiMAX-WiFi is compared with the conventional WiMAX surveillance models. The video surveillance models and the algorithm that exploit the advantages of both WiMAX and Wi-Fi for scenarios of fixed and mobile wireless cameras have been proposed, simulated and compared with the mathematical/analytical models. The hybrid WiMAX-WiFi video surveillance model has been extended to include a Wireless Mesh configuration on the Wi-Fi part, to improve the scalability and reliability. A performance analysis for hybrid WiMAX-WiFi system with an appropriate Mobility model has been considered for the case of mobile cameras. A security software application for mobile smartphones that sends surveillance images to either local or remote servers has been developed. The developed software has been tested, evaluated and deployed in low bandwidth Wi-Fi wireless network environments. WiMAX is a wireless metropolitan access network technology that provides broadband services to the connected customers. Major modules and units of WiMAX include the Customer Provided Equipment (CPE), the Access Service Network (ASN) which consist one or more Base Stations (BS) and the Connectivity Service Network (CSN). Various interfaces exist between each unit and module. WiMAX is based on the IEEE 802.16 family of standards. Wi-Fi, on the other hand, is a wireless access network operating in the local area network; and it is based on the IEEE 802.11 standards
    • 

    corecore