603 research outputs found
Recommended from our members
Application priority framework for fixed mobile converged communication networks
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.The current prospects in wired and wireless access networks, it is becoming increasingly important to address potential convergence in order to offer integrated broadband services. These systems will need to offer higher data transmission capacities and long battery life, which is the catalyst for an everincreasing variety of air interface technologies targeting local area to wide area connectivity. Current integrated industrial networks do not offer application aware context delivery and enhanced services for optimised networks. Application aware services provide value-added functionality to business applications by capturing, integrating, and consolidating intelligence about users and their endpoint devices from various points in the network. This thesis mainly intends to resolve the issues related to ubiquitous application aware service, fair allocation of radio access, reduced energy consumption and improved capacity. A technique that measures and evaluates the data rate demand to reduce application response time and queuing delay for multi radio interfaces is proposed. The technique overcomes the challenges of network integration, requiring no user intervention, saving battery life and selecting the radio access connection for the application requested by the end user. This study is split in two parts. The first contribution identifies some constraints of the services towards the application layer in terms of e.g. data rate and signal strength. The objectives are achieved by application controlled handover (ACH) mechanism in order to maintain acceptable data rate for real-time application services. It also looks into the impact of the radio link on the application and identifies elements and parameters like wireless link quality and handover that will influence the application type. It also identifies some enhanced traditional mechanisms such as distance controlled multihop and mesh topology required in order to support energy efficient multimedia applications. The second contribution unfolds an intelligent application priority assignment mechanism (IAPAM) for medical applications using wireless sensor networks. IAPAM proposes and evaluates a technique based on prioritising multiple virtual queues for the critical nature of medical data to improve instant transmission. Various mobility patterns (directed, controlled and random waypoint) has been investigated and compared by simulating IAPAM enabled mobile BWSN. The following topics have been studied, modelled, simulated and discussed in this thesis: 1. Application Controlled Handover (ACH) for multi radios over fibre 2. Power Controlled Scheme for mesh multi radios over fibre using ACH 3. IAPAM for Biomedical Wireless Sensor Networks (BWSN) and impact of mobility over IAPAM enabled BWSN. Extensive simulation studies are performed to analyze and to evaluate the proposed techniques. Simulation results demonstrate significant improvements in multi radios over fibre performance in terms of application response delay and power consumption by upto 75% and 15 % respectively, reduction in traffic loss by upto 53% and reduction in delay for real time application by more than 25% in some cases
WLC22-4: Efficient request mechanism usage in IEEE 802.16
IEEE 802.16 protocols for metropolitan broadband wireless access systems have been standardized recently. According to the standard, a subscriber station can deliver bandwidth request messages to a base station by numerous methods. This paper provides both the simulation and analytical models for the investigation of specified random access method, which is compared with centralized polling and station- grouping mechanisms. Based on the assumptions of Bernoulli request arrival process and ideal channel conditions, the mean delay of a request transmission is evaluated for varying number of transmission opportunities and different arrival rates
A comprehensive survey of wireless body area networks on PHY, MAC, and network layers solutions
Recent advances in microelectronics and integrated circuits, system-on-chip design, wireless communication and intelligent low-power sensors have allowed the realization of a Wireless Body Area Network (WBAN). A WBAN is a collection of low-power, miniaturized, invasive/non-invasive lightweight wireless sensor nodes that monitor the human body functions and the surrounding environment. In addition, it supports a number of innovative and interesting applications such as ubiquitous healthcare, entertainment, interactive gaming, and military applications. In this paper, the fundamental mechanisms of WBAN including architecture and topology, wireless implant communication, low-power Medium Access Control (MAC) and routing protocols are reviewed. A comprehensive study of the proposed technologies for WBAN at Physical (PHY), MAC, and Network layers is presented and many useful solutions are discussed for each layer. Finally, numerous WBAN applications are highlighted
Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks
Wireless mesh networks (WMNs) have emerged as a promising concept to meet the
challenges in next-generation wireless networks such as providing flexible,
adaptive, and reconfigurable architecture while offering cost-effective
solutions to service providers. As WMNs become an increasingly popular
replacement technology for last-mile connectivity to the home networking,
community and neighborhood networking, it is imperative to design efficient and
secure communication protocols for these networks. However, several
vulnerabilities exist in currently existing protocols for WMNs. These security
loopholes can be exploited by potential attackers to launch attack on WMNs. The
absence of a central point of administration makes securing WMNs even more
challenging. The broadcast nature of transmission and the dependency on the
intermediate nodes for multi-hop communications lead to several security
vulnerabilities in WMNs. The attacks can be external as well as internal in
nature. External attacks are launched by intruders who are not authorized users
of the network. For example, an intruding node may eavesdrop on the packets and
replay those packets at a later point of time to gain access to the network
resources. On the other hand, the internal attacks are launched by the nodes
that are part of the WMN. On example of such attack is an intermediate node
dropping packets which it was supposed to forward. This chapter presents a
comprehensive discussion on the current authentication and privacy protection
schemes for WMN. In addition, it proposes a novel security protocol for node
authentication and message confidentiality and an anonymization scheme for
privacy protection of users in WMNs.Comment: 32 pages, 10 figures. The work is an extended version of the author's
previous works submitted in CoRR: arXiv:1107.5538v1 and arXiv:1102.1226v
Security and Privacy Issues in Wireless Mesh Networks: A Survey
This book chapter identifies various security threats in wireless mesh
network (WMN). Keeping in mind the critical requirement of security and user
privacy in WMNs, this chapter provides a comprehensive overview of various
possible attacks on different layers of the communication protocol stack for
WMNs and their corresponding defense mechanisms. First, it identifies the
security vulnerabilities in the physical, link, network, transport, application
layers. Furthermore, various possible attacks on the key management protocols,
user authentication and access control protocols, and user privacy preservation
protocols are presented. After enumerating various possible attacks, the
chapter provides a detailed discussion on various existing security mechanisms
and protocols to defend against and wherever possible prevent the possible
attacks. Comparative analyses are also presented on the security schemes with
regards to the cryptographic schemes used, key management strategies deployed,
use of any trusted third party, computation and communication overhead involved
etc. The chapter then presents a brief discussion on various trust management
approaches for WMNs since trust and reputation-based schemes are increasingly
becoming popular for enforcing security in wireless networks. A number of open
problems in security and privacy issues for WMNs are subsequently discussed
before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the
author's previous submission in arXiv submission: arXiv:1102.1226. There are
some text overlaps with the previous submissio
- …