292 research outputs found

    How does CSMA/CA affect the performance and security in wireless blockchain networks

    Get PDF
    The impact of communication transmission delay on the original blockchain, has not been well considered and studied since it is primarily designed in stable wired communication environment with high communication capacity. However, in a wireless scenario, due to the scarcity of spectrum resource, a blockchain user may have to compete for wireless channel to broadcast transactions following Media Access Control (MAC) mechanism. As a result, the communication transmission delay may be significant and pose a bottleneck on the blockchain system performance and security. To facilitate blockchain applications in wireless Industrial Internet of Things (IIoT), this paper aims to investigate whether the widely used MAC mechanism, Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA), is suitable for Wireless Blockchain Networks (WBN) or not. Based on tangle, as an example to analyze the system performance in term of confirmation delay, Transaction Per Second (TPS) and transaction loss probability by considering the impact of queueing and transmission delay caused by CSMA/CA. Next, a stochastic model is proposed to analyze the security issue taking into account the malicious double-spending attack. Simulation results provide valuable insights when running blockchain in wireless network, the performance would be limited by the traditional CSMA/CA protocol. Meanwhile, we demonstrate that the probability of launching a successful double-spending attack would be affected by CSMA/CA as well

    Design and Implementation of a True Decentralized Autonomous Control Architecture for Microgrids

    Get PDF
    Microgrids can serve as an integral part of the future power distribution systems. Most microgrids are currently managed by centralized controllers. There are two major concerns associated with the centralized controllers. One is that the single controller can become performance and reliability bottleneck for the entire system and its failure can bring the entire system down. The second concern is the communication delays that can degrade the system performance. As a solution, a true decentralized control architecture for microgrids is developed and presented. Distributing the control functions to local agents decreases the possibility of network congestion, and leads to the mitigation of long distance transmission of critical commands. Decentralization will also enhance the reliability of the system since the single point of failure is eliminated. In the proposed architecture, primary and secondary microgrid controls layers are combined into one physical layer. Tertiary control is performed by the controller located at the grid point of connection. Each decentralized controller is responsible of multicasting its status and local measurements, creating a general awareness of the microgrid status among all decentralized controllers. The proof-of concept implementation provides a practical evidence of the successful mitigation of the drawback of control command transmission over the network. A Failure Management Unit comprises failure detection mechanisms and a recovery algorithm is proposed and applied to a microgrid case study. Coordination between controllers during the recovery period requires low-bandwidth communications, which has no significant overhead on the communication infrastructure. The proof-of-concept of the true decentralization of microgrid control architecture is implemented using Hardware-in-the-Loop platform. The test results show a robust detection and recovery outcome during a system failure. System test results show the robustness of the proposed architecture for microgrid energy management and control scenarios

    System Performance Analysis of Cooperative Communication in Wireless Ad Hoc Networks

    Get PDF
    Wireless ad hoc networks have been attracting more and more attentions in recent years from both academia and industry, because of their low deployment costs and broad applications. Due to the scarcity of the radio spectrum, supporting concurrent transmissions by exploiting the spatial frequency reuse gain is necessary to enhance spectrum utilization. On the other hand, cooperative communication is a practical technique for realizing the spatial diversity gain to mitigate the detrimental effect of wireless channel and enhance the transmission reliability. Enabling concurrent cooperative transmissions across a network can achieve both types of gains. Due to the broadcast nature of wireless communications, the concurrent cooperative transmissions using the same radio channel generate interference to each other, which is the main performance-limiting factor. Accurate characterization of interference is a fundamental step towards evaluating the performance of cooperative communication in a wireless ad hoc network. However, the distributed network operation, random node locations, interference redistribution due to relay transmissions, and dynamic traffic arrival pose significant challenges in interference characterization. Under the protocol interference model, this thesis evaluates the effectiveness of cooperative communication in a wireless ad hoc network from a perspective of overall network performance through investigating the network throughput, which captures the tradeoff between single-link cooperation gain and network-wide reduced spatial frequency reuse due to relay transmissions. In particular, based on stochastic geometry, the outage probabilities of direct and cooperative transmissions are derived to characterize single-link cooperation gain. On the other hand, according to a randomized scheduling scheme, the expected numbers of concurrent direct and cooperative transmissions that can be accommodated within the network coverage area are calculated to characterize network-wide reduced spatial frequency reuse. The analytical results show that a locally beneficial cooperation decision is not guaranteed to be network-wide beneficial. The number of potential relays determines the achievable performance of a cooperative link, and varies for different source-destination pairs due to random relay locations. This thesis proposes an opportunistic cooperation strategy based on the number of potential relays available for each source-destination pair. Under the physical interference model, the correlation of node locations induces the correlation of interference power. Via modeling node locations as a Poisson point process (PPP) and based on the Campbell's theorem, the temporal correlation coefficient of interference power at a destination node is analyzed. In addition, we derive the outage probability of opportunistic cooperation while taking into account the spatial and temporal interference correlation. The overall network performance can be enhanced by adjusting the proportion of concurrent cooperative transmissions. In addition to random node locations and interference redistribution, dynamic traffic arrival further complicates the interference characterization. This thesis investigates the performance of cooperative communication in a wireless ad hoc network with unsaturated traffic, which introduces a correlation between the interferer density and packet retransmission probability. Based on queueing theory and stochastic geometry, the interference power is characterized from two aspects, namely stationary interferer density and interference correlation in two consecutive time-slots, to evaluate the network performance. The analytical results show that the performance analysis under the assumption of independent interference power overestimates the network performance. The proposed theoretical performance analysis framework provides a step towards better understanding of the benefits and limitations of cooperative communication in wireless ad hoc networks with spatially random nodes, and in turn provides useful insights on protocol design and parameter setting for large-scale networks.4 month

    A Game Theory based Contention Window Adjustment for IEEE 802.11 under Heavy Load

    Get PDF
    The 802.11 families are considered as the most applicable set of standards for Wireless Local Area Networks (WLANs) where nodes make access to the wireless media using random access techniques. In such networks, each node adjusts its contention window to the minimum size irrespective of the number of competing nodes, so in saturated mode and excessive number of nodes available, the network performance is reduced due to severe collision probability. A cooperative game is being proposed to adjust the users’ contention windows in improving the network throughput, delay and packet drop ratio under heavy traffic load circumstances. The system’s performance evaluated by simulations indicate some superiorities of the proposed method over 802.11-DCF (Distribute Coordinate Function)

    A secured message transmission protocol for vehicular ad hoc networks

    Get PDF
    Vehicular Ad hoc Networks (VANETs) become a very crucial addition in the Intelligent Transportation System (ITS). It is challenging for a VANET system to provide security services and parallelly maintain high throughput by utilizing limited resources. To overcome these challenges, we propose a blockchain-based Secured Cluster-based MAC (SCB-MAC) protocol. The nearby vehicles heading towards the same direction will form a cluster and each of the clusters has its blockchain to store and distribute the safety messages. The message which contains emergency information and requires Strict Delay Requirement (SDR) for transmission are called safety messages (SM). Cluster Members (CMs) sign SMs with their private keys while sending them to the blockchain to confirm authentication, integrity, and confidentiality of the message. A Certificate Authority (CA) is responsible for physical verification, key generation, and privacy preservation of the vehicles. We implemented a test scenario as proof of concept and tested the safety message transmission (SMT) protocol in a real-world platform. Computational and storage overhead analysis shows that the proposed protocol for SMT implements security, authentication, integrity, robustness, non-repudiation, etc. while maintaining the SDR. Messages that are less important compared to the SMs are called non-safety messages (NSM) and vehicles use RTS/CTS mechanism for NSM transmission. Numerical studies show that the proposed NSM transmission method maintains 6 times more throughput, 2 times less delay and 125% less Packet Dropping Rate (PDR) than traditional MAC protocols. These results prove that the proposed protocol outperforms the traditionalMAC protocols

    Distributed routing in networks and its application

    Get PDF
    Tato diplomová práce popisuje decentralizovaný systém jménem NodeSkipper určený pro kteroukoli spojitou neorientovanou síť. Uzly v této síti mohou posílat nebo vyhledávat jiné uzly nebo vyvolat proces "consensus", kdy se celá síť shodne na hodnotě zvolené veličiny tak, aby byl výsledek ovlivněn každým uzlem a byl pro všechny uzly stejný. NodeSkipper je inspirovaný datovou strukturou Skip List, která díky náhodnosti své struktury, která se přes postupné přidávání a ubírání uzlů přibližuje zvolenému pravděpodobnostnímu rozdělení, nabízí velmi všestranný výkon a vysokou robustnost. Protokol NodeSkipper pracuje nejlépe pro sítě s efektem malého světa, který se vyskytuje ve skutečných sítích přirozeně. Díky tomuto efektu roste průměr sítě pouze logaritmicky vzhledem k množství uzlů. V takové síti je NodeSkipper schopný doručit zprávu nebo hledat uzel v logaritmickém čase. Díky své necentralizovanosti a absenci konkrétní struktury funguje velmi dobře s velkými sítěmi, kde jsou nové uzly nepředvídatelně přidávány a odebírány a přímá spojení navazována a ztrácena, jako například vozidla v silniční dopravě, doručovací roboti, stroje v továrně, bezpečnostní systémy pro velká území, počítače spolupracující na výpočetně náročné úloze nebo roboti účastnící se boje. Protože tento systém nemá žádné uzly s vyšší důležitostí, je odolný vůči cíleným útokům a vzhledem k tomu, že funguje na kterémkoli spojitém grafu, je odolný vůči náhodným útokům a selháním. Díky schopnosti dojít ke shodě může dobře koordinovat své prostředkyThis thesis describes a decentralized system that can work over any connected undirected network called NodeSkipper. Each node in this system can send a message to another node, look-up any node or request the system to reach consensus, which means that every node in the system will agree on a quantity of interest in a manner where each node influences the result. The system is designed after the Skip List data structure, which uses randomized structure that over successive entries and removals converges towards its probability distribution, while providing great all-rounded performance and robustness. The NodeSkipper protocol works best over networks with small-world effect, which occurs naturally on real networks. This effect manifests itself by network diameter scales logarithmically with the number of nodes. On such network, NodeSkipper can deliver messages and look-up nodes in logarithmical time as well. Thanks to its decentralized nature and no rigid structure, it works well with large networks where new nodes are unpredictably added and removed and direct connections gained and lost, such as cars on the road, delivery robots, machines in a manufacturing plant, large scale security system, computers working together on computationally demanding task or battle units in armed conflict. Because this system does not have any nodes of special importance, it is resistant to targeted attacks. Because it works as long as the graph is connected, it is resistant to random attacks and failures. Thanks to its ability to reach network wide consensus, it can coordinate its efforts

    DSRC Versus LTE-V2X: Empirical Performance Analysis of Direct Vehicular Communication Technologies

    Get PDF
    Vehicle-to-Vehicle (V2V) communication systems have an eminence potential to improve road safety and optimize traffic flow by broadcasting Basic Safety Messages (BSMs). Dedicated Short-Range Communication (DSRC) and LTE Vehicle-to-Everything (V2X) are two candidate technologies to enable V2V communication. DSRC relies on the IEEE 802.11p standard for its PHY and MAC layer while LTE-V2X is based on 3GPP’s Release 14 and operates in a distributed manner in the absence of cellular infrastructure. There has been considerable debate over the relative advantages and disadvantages of DSRC and LTE-V2X, aiming to answer the fundamental question of which technology is most effective in real-world scenarios for various road safety and traffic efficiency applications. In this paper, we present a comprehensive survey of these two technologies (i.e., DSRC and LTE-V2X) and related works. More specifically, we study the PHY and MAC layer of both technologies in the survey study and compare the PHY layer performance using a variety of field tests. First, we provide a summary of each technology and highlight the limitations of each in supporting V2X applications. Then, we examine their performance based on different metrics
    corecore