586 research outputs found

    A Self-Organization Framework for Wireless Ad Hoc Networks as Small Worlds

    Full text link
    Motivated by the benefits of small world networks, we propose a self-organization framework for wireless ad hoc networks. We investigate the use of directional beamforming for creating long-range short cuts between nodes. Using simulation results for randomized beamforming as a guideline, we identify crucial design issues for algorithm design. Our results show that, while significant path length reduction is achievable, this is accompanied by the problem of asymmetric paths between nodes. Subsequently, we propose a distributed algorithm for small world creation that achieves path length reduction while maintaining connectivity. We define a new centrality measure that estimates the structural importance of nodes based on traffic flow in the network, which is used to identify the optimum nodes for beamforming. We show, using simulations, that this leads to significant reduction in path length while maintaining connectivity.Comment: Submitted to IEEE Transactions on Vehicular Technolog

    Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless networks

    Get PDF
    An innovative technology that is widely used in many applications is the Mobile Ad-hoc Network (MANET). Discovery and maintenance of routes at MANET are important issues. Within MANET, broadcasting is used to discover a path within on-demand routing protocols. Establishing and maintaining a route periodically among the nodes is the challenge that requires the transmitting of control packets across a network. This state leads to the issue of broadcasting storms. Broadcasting control packets increase control packets overhead and decrease network performance. In this paper, we proposed a scheme called AODV-Velocity and Dynamic (AODV-VD) for effective broadcast control packets. The routing protocol for the ad-hoc on-demand distance victor (AODV) is used to implement the proposed AODV-VD scheme. AODV-VD scheme reduces both the excessive route discovery control packets and network overhead. Network simulator version 2.35 (NS2.35) was used to compare the proposed AODV-VD scheme to the AODV routing protocol in terms of end-to-end latency, average throughput, packet transmission ratio and overhead ratio

    High-Performance Broadcast and Multicast Protocols for Multi-Radio Multi-Channel Wireless Mesh Networks

    Get PDF
    Recently, wireless mesh networks (WMNs) have attracted much attention. A vast amount of unicast, multicast and broadcast protocols has been developed for WMNs or mobile ad hoc networks (MANETs). First of all, broadcast and multicast in wireless networks are fundamentally different from the way in which wired networks function due to the well-known wireless broadcast/multicast advantage. Moreover, most broadcast and multicast protocols in wireless networks assume a single-radio single-channel and single-rate network model, or a generalized physical model, which does not take into account the impact of interference. This dissertation focuses on high-performance broadcast and multicast protocols designed for multi-radio multi-channel (MRMC) WMNs. MRMC increases the capacity of the network from different aspects. Multi-radio allows mesh nodes to simultaneously send and receive through different radios to its neighbors. Multi-channel allows channels to be reused across the network, which expands the available spectrum and reduces the interference. Unlike MANETs, WMNs are assumed to be static or with minimal mobility. Therefore, the main design goal in WMNs is to achieve high throughput rather than to maintain connectivity. The capacity of WMNs is constrained by the interference caused by the neighbor nodes. One direct design objective is to minimize or reduce the interference in broadcast and multicast. This dissertation presents a set of broadcast and multicast protocols and mathematical formulations to achieve the design goal in MRMC WMNs. First, the broadcast problem is addressed with full consideration of both inter-node and intra-node interference to achieve efficient broadcast. The interference-aware broadcast protocol simultaneously achieves full reliability, minimum broadcast or multicast latency, minimum redundant transmissions, and high throughput. With an MRMC WMN model, new link and channel quality metrics are defined and are suitable for the design of broadcast and multicast protocols. Second, the minimum cost broadcast problem (MCBP), or minimum number of transmissions problem, is studied for MRMC WMNs. Minimum cost broadcast potentially allows more effective and efficient schedule algorithms to be designed. The proposed protocol with joint consideration of channel assignment reduces the interference to improve the throughput in the MCBP. Minimum cost broadcast in MRMC WMNs is very different from that in the single radio single channel scenario. The channel assignment in MRMC WMNs is used to assign multiple radios of every node to different channels. It determines the actual network connectivity since adjacent nodes have to be assigned to a common channel. Transmission on different channels makes different groups of neighboring nodes, and leads to different interference. Moreover, the selection of channels by the forward nodes impacts on the number of radios needed for broadcasting. Finally, the interference optimization multicast problem in WMNs with directional antennas is discussed. Directional transmissions can greatly reduce radio interference and increase spatial reuse. The interference with directional transmissions is defined for multicast algorithm design. Multicast routing found by the interference-aware algorithm tends to have fewer channel collisions. The research work presented in this dissertation concludes that (1) new and practical link and channel metrics are required for designing broadcast and multicast in MRMC WMNs; (2) a small number of radios is sufficient to significantly improve throughput of broadcast and multicast in WMNs; (3) the number of channels has more impact on almost all performance metrics, such as the throughput, the number of transmission, and interference, in WMNs

    Routing Security Issues in Wireless Sensor Networks: Attacks and Defenses

    Get PDF
    Wireless Sensor Networks (WSNs) are rapidly emerging as an important new area in wireless and mobile computing research. Applications of WSNs are numerous and growing, and range from indoor deployment scenarios in the home and office to outdoor deployment scenarios in adversary's territory in a tactical battleground (Akyildiz et al., 2002). For military environment, dispersal of WSNs into an adversary's territory enables the detection and tracking of enemy soldiers and vehicles. For home/office environments, indoor sensor networks offer the ability to monitor the health of the elderly and to detect intruders via a wireless home security system. In each of these scenarios, lives and livelihoods may depend on the timeliness and correctness of the sensor data obtained from dispersed sensor nodes. As a result, such WSNs must be secured to prevent an intruder from obstructing the delivery of correct sensor data and from forging sensor data. To address the latter problem, end-to-end data integrity checksums and post-processing of senor data can be used to identify forged sensor data (Estrin et al., 1999; Hu et al., 2003a; Ye et al., 2004). The focus of this chapter is on routing security in WSNs. Most of the currently existing routing protocols for WSNs make an optimization on the limited capabilities of the nodes and the application-specific nature of the network, but do not any the security aspects of the protocols. Although these protocols have not been designed with security as a goal, it is extremely important to analyze their security properties. When the defender has the liabilities of insecure wireless communication, limited node capabilities, and possible insider threats, and the adversaries can use powerful laptops with high energy and long range communication to attack the network, designing a secure routing protocol for WSNs is obviously a non-trivial task.Comment: 32 pages, 5 figures, 4 tables 4. arXiv admin note: substantial text overlap with arXiv:1011.152

    Unified Role Assignment Framework For Wireless Sensor Networks

    Get PDF
    Wireless sensor networks are made possible by the continuing improvements in embedded sensor, VLSI, and wireless radio technologies. Currently, one of the important challenges in sensor networks is the design of a systematic network management framework that allows localized and collaborative resource control uniformly across all application services such as sensing, monitoring, tracking, data aggregation, and routing. The research in wireless sensor networks is currently oriented toward a cross-layer network abstraction that supports appropriate fine or course grained resource controls for energy efficiency. In that regard, we have designed a unified role-based service paradigm for wireless sensor networks. We pursue this by first developing a Role-based Hierarchical Self-Organization (RBSHO) protocol that organizes a connected dominating set (CDS) of nodes called dominators. This is done by hierarchically selecting nodes that possess cumulatively high energy, connectivity, and sensing capabilities in their local neighborhood. The RBHSO protocol then assigns specific tasks such as sensing, coordination, and routing to appropriate dominators that end up playing a certain role in the network. Roles, though abstract and implicit, expose role-specific resource controls by way of role assignment and scheduling. Based on this concept, we have designed a Unified Role-Assignment Framework (URAF) to model application services as roles played by local in-network sensor nodes with sensor capabilities used as rules for role identification. The URAF abstracts domain specific role attributes by three models: the role energy model, the role execution time model, and the role service utility model. The framework then generalizes resource management for services by providing abstractions for controlling the composition of a service in terms of roles, its assignment, reassignment, and scheduling. To the best of our knowledge, a generic role-based framework that provides a simple and unified network management solution for wireless sensor networks has not been proposed previously

    DESIGN OF EFFICIENT IN-NETWORK DATA PROCESSING AND DISSEMINATION FOR VANETS

    Get PDF
    By providing vehicle-to-vehicle and vehicle-to-infrastructure wireless communications, vehicular ad hoc networks (VANETs), also known as the “networks on wheels”, can greatly enhance traffic safety, traffic efficiency and driving experience for intelligent transportation system (ITS). However, the unique features of VANETs, such as high mobility and uneven distribution of vehicular nodes, impose critical challenges of high efficiency and reliability for the implementation of VANETs. This dissertation is motivated by the great application potentials of VANETs in the design of efficient in-network data processing and dissemination. Considering the significance of message aggregation, data dissemination and data collection, this dissertation research targets at enhancing the traffic safety and traffic efficiency, as well as developing novel commercial applications, based on VANETs, following four aspects: 1) accurate and efficient message aggregation to detect on-road safety relevant events, 2) reliable data dissemination to reliably notify remote vehicles, 3) efficient and reliable spatial data collection from vehicular sensors, and 4) novel promising applications to exploit the commercial potentials of VANETs. Specifically, to enable cooperative detection of safety relevant events on the roads, the structure-less message aggregation (SLMA) scheme is proposed to improve communication efficiency and message accuracy. The scheme of relative position based message dissemination (RPB-MD) is proposed to reliably and efficiently disseminate messages to all intended vehicles in the zone-of-relevance in varying traffic density. Due to numerous vehicular sensor data available based on VANETs, the scheme of compressive sampling based data collection (CS-DC) is proposed to efficiently collect the spatial relevance data in a large scale, especially in the dense traffic. In addition, with novel and efficient solutions proposed for the application specific issues of data dissemination and data collection, several appealing value-added applications for VANETs are developed to exploit the commercial potentials of VANETs, namely general purpose automatic survey (GPAS), VANET-based ambient ad dissemination (VAAD) and VANET based vehicle performance monitoring and analysis (VehicleView). Thus, by improving the efficiency and reliability in in-network data processing and dissemination, including message aggregation, data dissemination and data collection, together with the development of novel promising applications, this dissertation will help push VANETs further to the stage of massive deployment

    Analyzing the Impact of Wireless Multi-Hop Networking On Vehicular Safety

    Get PDF
    One of the core challenges of Intelligent Transportation System is the dissemination of timely and accurate vehicle information (e.g. speed, position) to geographically large distances without compromising data supply rates from immediate neighbors. This feature is critical for the design of vehicle safety and navigation applications. Single hop broadcasting is often inadequate to ensure vehicle safety when the platoon size is arbitrarily large due to its upper bound on rate and range of wireless message transmission. Existing wireless multi-hop protocols do not ensure reliable message delivery while avoiding network congestion in the shared channel. In this thesis, we make two separate but related investigations to address this challenge - (1) Analyze the impact of distance sensitive multi-hop broadcasting in realistic traffic network (2) Analyze the impact of wireless multi-hop network in vehicle safety. For investigating the first part, we used VCAST, a distance sensitive information propagation technique, in which information is forwarded at a rate that decreases linearly with distance from the source. VCAST is evaluated by using extensive simulations in ns-3, a discrete event simulator for wireless and mobile ad-hoc networks, under different density, source broadcast rates and communication range. To simulate realistic traffic movement, we used 2d grids of different sizes and used both uniform and non-uniform mobility. The results show that VCAST is scalable for - large number of vehicles and large source broadcast rates. It is further shown that successful scaling is achieved by reduced number of vehicle records transmitted per second per vehicle for varying network sizes and varying source broadcast rates. Vehicle safety messages for VCAST are piggy backed on heart beat messages and does not require any modifications to the existing vehicular communication standards. For investigating the second part, we implemented a realistic car following model and used string stability analysis as a metric for measuring vehicle safety. The basic idea is to exploit the small network propagation time in disseminating safety messages over large distances, instead of relying on just the predecessor vehicle\u27s state. This enables distant vehicles in a traffic stream to plan well in advance against rear end collisions which could lead to string instability. We also proposed one such proactive method of planning - and that is by controlling the headway time. Through extensive simulations, we obtained results for vehicle safety when some incident is detected abruptly on its course. The results show that proactive planning using multi-hop network makes the entire platoon string stable in the presence of emergency road incidents

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio

    Surveying Position Based Routing Protocols for Wireless Sensor and Ad-hoc Networks

    Get PDF
    A focus of the scientific community is to design network oriented position-based routing protocols and this has resulted in a very high number of algorithms, different in approach and performance and each suited only to particular applications. However, though numerous, very few position-based algorithms have actually been adopted for commercial purposes. This article is a survey of almost 50 position-based routing protocols and it comes as an aid in the implementation of this type of routing in various applications which may need to consider the advantages and pitfalls of position-based routing. An emphasis is made on geographic routing, whose notion is clarified as a more restrictive and more efficient type of position-based routing. The protocols are therefore divided into geographic and non-geographic routing protocols and each is characterized according to a number of network design issues and presented in a comparative manner from multiple points of view. The main requirements of current general applications are also studied and, depending on these, the survey proposes a number of protocols for use in particular application areas. This aims to help both researchers and potential users assess and choose the protocol best suited to their interest

    Survey on diversity-based routing in wireless mesh networks: Challenges and solutions

    Get PDF
    Wireless multi-hop networks often experience severe performance degradations when legacy routing algorithms are employed, because they are not optimized to take advantage of the peculiarities of wire- less links. Indeed, the wireless channel is intrinsically a broadcast medium, making a point-to-point link abstraction not suitable. Furthermore, channel conditions may significantly differ both in time and space, making routing over predetermined paths inadequate to adapt the forwarding process to the channel var- iability. Motivated by these limitations, the research community has started to explore novel routing par- adigms and design principles dealing with the wireless diversity as an opportunity rather than a shortcoming. Within this large body of research, opportunistic routing and network coding are emerging as two of the most promising approaches to exploit the intrinsic characteristics of multi-hop wireless net- works, such as multi-user diversity. The aim of this survey is to examine how opportunistic forwarding and network coding can achieve performance gains by performing hop-by-hop route construction and by encoding data packets at intermediate nodes. To this end, we present a taxonomy of existing solutions, and we describe their most representative features, benefits and design challenges. We also discuss open issues in this research area, with a special attention to the ones most related to wireless mesh networks
    • …
    corecore