2,032 research outputs found

    Robotic Wireless Sensor Networks

    Full text link
    In this chapter, we present a literature survey of an emerging, cutting-edge, and multi-disciplinary field of research at the intersection of Robotics and Wireless Sensor Networks (WSN) which we refer to as Robotic Wireless Sensor Networks (RWSN). We define a RWSN as an autonomous networked multi-robot system that aims to achieve certain sensing goals while meeting and maintaining certain communication performance requirements, through cooperative control, learning and adaptation. While both of the component areas, i.e., Robotics and WSN, are very well-known and well-explored, there exist a whole set of new opportunities and research directions at the intersection of these two fields which are relatively or even completely unexplored. One such example would be the use of a set of robotic routers to set up a temporary communication path between a sender and a receiver that uses the controlled mobility to the advantage of packet routing. We find that there exist only a limited number of articles to be directly categorized as RWSN related works whereas there exist a range of articles in the robotics and the WSN literature that are also relevant to this new field of research. To connect the dots, we first identify the core problems and research trends related to RWSN such as connectivity, localization, routing, and robust flow of information. Next, we classify the existing research on RWSN as well as the relevant state-of-the-arts from robotics and WSN community according to the problems and trends identified in the first step. Lastly, we analyze what is missing in the existing literature, and identify topics that require more research attention in the future

    Attacks and countermeasures on routing protocols in wireless networks

    Get PDF
    Routing in wireless networks is not an easy task as they are highly vulnerable to attacks. The main goal of this work is to study the routing performance and security aspects of wireless ad hoc and mesh networks. Most of the routing protocols use hop-count as the routing metric. Hop count metric may not be appropriate for routing in wireless networks as this does not account for the link qualities, advantages of multi-radio paradigm etc. There are several metrics designed for link quality based source routing protocols for multi-radio wireless ad hoc and mesh networks. For example Weighted Cumulative Expected Transmission Time (WCETT), Adjusted Expected Transfer Delay(AETD) etc. But these metrics do not consider the effect of individual link qualities on the total route quality and route selection. This lack of ability from WCETT or AETD would allow them to select suboptimal paths when actually an optimal path is available. In another point of view, this inability can create a routing disruption attack named as delay-variation attack (a variant of black hole attack). It can be launched by a couple of colluding attackers attracting packets at one point by showing very good link qualities and dropping packets at another point by decreasing the link quality. To select an optimal route and prevent the above mentioned attack, a new routing metric known as Variance Based Path Quality metric (VBPQ) is proposed. VBPQ metric provides a robust, reliable and secure edge to the routing mechanism. Another major contribution of this study is to provide a detection mechanism for wormhole attacks in wireless ad hoc networks operating on link quality based source routing protocols. There have been several detection techniques designed for hop count based routing protocols but not for link quality based source routing protocols. In this work, a data mining approach called Cross feature analysis is used in an algorithm to detect wormhole attacks

    A LOAD-BASED APPROACH TO FORMING A CONNECTED DOMINATING SET FOR AN AD HOC NETWORK

    Get PDF
    Efficient routing in mobile ad hoc networks (MANETs) is highly desired and connected dominating sets (CDS) have been gaining significant popularity in this regard. The CDS based approach reduces the search for a minimum cost path between a pair of source and destination terminals to the set of terminals forming the backbone network. Researchers over the years have developed numerous distributed and localized algorithms for constructing CDSs which minimize the number of terminals forming the backbone or which provide multiple node-disjoint paths between each pair of terminals. However none of this research focuses on minimizing the load at the bottleneck terminal of the backbone network constructed by the CDS algorithms. A terminal becomes a bottleneck if the offered traffic load is greater than its effective transmission rate. In this thesis we analyze the load-based performance of a popular CDS algorithm which has been employed in MANET routing and a k-connected k-dominating set (k-CDS) algorithm and compare it with our new centralized algorithm which has been designed to minimize the load at the bottleneck terminal of the backbone network. We verify the effectiveness of our algorithm by simulating over a large number of random test networks

    Vertex-linked infrastructure for ad hoc networks

    Get PDF
    An ad hoc network is composed of geographically dispersed nodes that may move arbitrarily and communicate with each other without the support of a stationary infrastructure. Compared with a wireless network with a stationary infrastructure, such as a cellular network, an ad hoc network is inherently less efficient. Therefore, a number of proposals have been made to develop a quasi-stationary infrastructure for ad hoc networks. However, the dynamic nature of ad hoc networks makes it very costly to maintain such an infrastructure. This article proposes a Vertex-Linked Infrastructure (VLI) for ad hoc networks. This novel approach uses an easily deployable, survivable, wired infrastructure as a backbone of the ad hoc network, thus realizing the advantages of an infrastructure in wireless communications, but without the overhead due to maintaining such an infrastructure.published_or_final_versio

    A New Architecture for Application-aware Cognitive Multihop Wireless Networks

    Get PDF
    In this article, we propose a new architecture for AC-MWN. Cognitive radio is a technique to adaptively use the spectrum so that the resource can be used more efficiently in a low-cost way. A multihop wireless network can be deployed quickly and flexibly without fixed infrastructure. In our proposed new architecture, we study backbone routing schemes with network cognition, and a routing scheme with network coding and spectrum adaptation. A testbed is implemented to test the proposed schemes for AC-MWN. In addition to basic measurements, we implement a video streaming application based on the proposed AC-MWN architecture using cognitive radios. Preliminary results demonstrate that the proposed AC-MWN is applicable, and is valuable for future low-cost and flexible communication networks

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio

    Radio communication for Communications-Based Train Control (CBTC): A tutorial and survey

    Get PDF

    Towards a Unified Radio Power Management Architecture for Wireless Sensor Networks

    Get PDF
    In many wireless sensor networks, energy is an extremely limited resource. While many different power management strategies have been proposed to help reduce the amount of energy wasted, application developers still face two fundamental challenges when developing systems with stringent power constraints. First, existing power management strategies are usually tightly coupled with network protocols and other system functionality. This monolithic approach has led to standalone solutions that cannot easily be reused or extended to other applications or platforms. Second, different power management strategies make different and sometimes even conflicting assumptions about the rest of the system with which they need to interact. Without knowledge of which strategies are interoperable with which set of network stack protocols it is dificult for application developers to make informed decisions as to which strategy is most appropriate for their particular application. To address these challenges, we propose a Unified Power Management Architecture (UPMA) that supports the flexible composition of different power management strategies based on application requirements. We envision this architecture to consist of both low level programming interfaces, as well as high level modeling abstractions. These abstractions characterize the key properties of different applications, network protocols, and power management strategies. Using these properties, configuration tools can be created that match each application with the most appropriate network protocol and power management strategy suited to its needs

    Self-Configuration and Self-Optimization Process in Heterogeneous Wireless Networks

    Get PDF
    Self-organization in Wireless Mesh Networks (WMN) is an emergent research area, which is becoming important due to the increasing number of nodes in a network. Consequently, the manual configuration of nodes is either impossible or highly costly. So it is desirable for the nodes to be able to configure themselves. In this paper, we propose an alternative architecture for self-organization of WMN based on Optimized Link State Routing Protocol (OLSR) and the ad hoc on demand distance vector (AODV) routing protocols as well as using the technology of software agents. We argue that the proposed self-optimization and self-configuration modules increase the throughput of network, reduces delay transmission and network load, decreases the traffic of HELLO messages according to network’s scalability. By simulation analysis, we conclude that the self-optimization and self-configuration mechanisms can significantly improve the performance of OLSR and AODV protocols in comparison to the baseline protocols analyzed
    • 

    corecore