2,772 research outputs found
Algebraic Network Coding Approach to Deterministic Wireless Relay Networks
The deterministic wireless relay network model, introduced by Avestimehr et
al., has been proposed for approximating Gaussian relay networks. This model,
known as the ADT network model, takes into account the broadcast nature of
wireless medium and interference. Avestimehr et al. showed that the Min-cut
Max-flow theorem holds in the ADT network.
In this paper, we show that the ADT network model can be described within the
algebraic network coding framework introduced by Koetter and Medard. We prove
that the ADT network problem can be captured by a single matrix, called the
"system matrix". We show that the min-cut of an ADT network is the rank of the
system matrix; thus, eliminating the need to optimize over exponential number
of cuts between two nodes to compute the min-cut of an ADT network.
We extend the capacity characterization for ADT networks to a more general
set of connections. Our algebraic approach not only provides the Min-cut
Max-flow theorem for a single unicast/multicast connection, but also extends to
non-multicast connections such as multiple multicast, disjoint multicast, and
two-level multicast. We also provide sufficiency conditions for achievability
in ADT networks for any general connection set. In addition, we show that the
random linear network coding, a randomized distributed algorithm for network
code construction, achieves capacity for the connections listed above.
Finally, we extend the ADT networks to those with random erasures and cycles
(thus, allowing bi-directional links). Note that ADT network was proposed for
approximating the wireless networks; however, ADT network is acyclic.
Furthermore, ADT network does not model the stochastic nature of the wireless
links. With our algebraic framework, we incorporate both cycles as well as
random failures into ADT network model.Comment: 9 pages, 12 figures, submitted to Allerton Conferenc
Low Power, Low Delay: Opportunistic Routing meets Duty Cycling
Traditionally, routing in wireless sensor networks consists of
two steps: First, the routing protocol selects a next hop,
and, second, the MAC protocol waits for the intended destination
to wake up and receive the data. This design makes
it difficult to adapt to link dynamics and introduces delays
while waiting for the next hop to wake up.
In this paper we introduce ORW, a practical opportunistic
routing scheme for wireless sensor networks. In a dutycycled
setting, packets are addressed to sets of potential receivers
and forwarded by the neighbor that wakes up first
and successfully receives the packet. This reduces delay and
energy consumption by utilizing all neighbors as potential
forwarders. Furthermore, this increases resilience to wireless
link dynamics by exploiting spatial diversity. Our results
show that ORW reduces radio duty-cycles on average
by 50% (up to 90% on individual nodes) and delays by 30%
to 90% when compared to the state of the art
Secure Routing in Wireless Mesh Networks
Wireless mesh networks (WMNs) have emerged as a promising concept to meet the
challenges in next-generation networks such as providing flexible, adaptive,
and reconfigurable architecture while offering cost-effective solutions to the
service providers. Unlike traditional Wi-Fi networks, with each access point
(AP) connected to the wired network, in WMNs only a subset of the APs are
required to be connected to the wired network. The APs that are connected to
the wired network are called the Internet gateways (IGWs), while the APs that
do not have wired connections are called the mesh routers (MRs). The MRs are
connected to the IGWs using multi-hop communication. The IGWs provide access to
conventional clients and interconnect ad hoc, sensor, cellular, and other
networks to the Internet. However, most of the existing routing protocols for
WMNs are extensions of protocols originally designed for mobile ad hoc networks
(MANETs) and thus they perform sub-optimally. Moreover, most routing protocols
for WMNs are designed without security issues in mind, where the nodes are all
assumed to be honest. In practical deployment scenarios, this assumption does
not hold. This chapter provides a comprehensive overview of security issues in
WMNs and then particularly focuses on secure routing in these networks. First,
it identifies security vulnerabilities in the medium access control (MAC) and
the network layers. Various possibilities of compromising data confidentiality,
data integrity, replay attacks and offline cryptanalysis are also discussed.
Then various types of attacks in the MAC and the network layers are discussed.
After enumerating the various types of attacks on the MAC and the network
layer, the chapter briefly discusses on some of the preventive mechanisms for
these attacks.Comment: 44 pages, 17 figures, 5 table
- …