4,459 research outputs found
Combined Coverage Area Reporting and Geographical Routing in Wireless Sensor-Actuator Networks for Cooperating with Unmanned Aerial Vehicles
In wireless sensor network (WSN) applications with multiple gateways, it is key to route location dependent subscriptions efficiently at two levels in the system. At the gateway level, data sinks must not waste the energy of the WSN by injecting subscriptions that are not relevant for the nodes in their coverage area and at WSN level, energy-efficient delivery of subscriptions to target areas is required. In this paper, we propose a mechanism in which (1) the WSN provides an accurate and up-to-date coverage area description to gateways and (2) the wireless sensor network re-uses the collected coverage area information to enable efficient geographical routing of location dependent subscriptions and other messages. The latter has a focus on routing of messages injected from sink nodes to nodes in the region of interest. Our proposed mechanisms are evaluated in simulation
On the Security of the Automatic Dependent Surveillance-Broadcast Protocol
Automatic dependent surveillance-broadcast (ADS-B) is the communications
protocol currently being rolled out as part of next generation air
transportation systems. As the heart of modern air traffic control, it will
play an essential role in the protection of two billion passengers per year,
besides being crucial to many other interest groups in aviation. The inherent
lack of security measures in the ADS-B protocol has long been a topic in both
the aviation circles and in the academic community. Due to recently published
proof-of-concept attacks, the topic is becoming ever more pressing, especially
with the deadline for mandatory implementation in most airspaces fast
approaching.
This survey first summarizes the attacks and problems that have been reported
in relation to ADS-B security. Thereafter, it surveys both the theoretical and
practical efforts which have been previously conducted concerning these issues,
including possible countermeasures. In addition, the survey seeks to go beyond
the current state of the art and gives a detailed assessment of security
measures which have been developed more generally for related wireless networks
such as sensor networks and vehicular ad hoc networks, including a taxonomy of
all considered approaches.Comment: Survey, 22 Pages, 21 Figure
Pervasive Data Access in Wireless and Mobile Computing Environments
The rapid advance of wireless and portable computing technology has brought a lot of research interests and momentum to the area of mobile computing. One of the research focus is on pervasive data access. with wireless connections, users can access information at any place at any time. However, various constraints such as limited client capability, limited bandwidth, weak connectivity, and client mobility impose many challenging technical issues. In the past years, tremendous research efforts have been put forth to address the issues related to pervasive data access. A number of interesting research results were reported in the literature. This survey paper reviews important works in two important dimensions of pervasive data access: data broadcast and client caching. In addition, data access techniques aiming at various application requirements (such as time, location, semantics and reliability) are covered
Low-complexity medium access control protocols for QoS support in third-generation radio access networks
One approach to maximizing the efficiency of
medium access control (MAC) on the uplink in a future wideband
code-division multiple-access (WCDMA)-based third-generation
radio access network, and hence maximize spectral efficiency,
is to employ a low-complexity distributed scheduling control
approach. The maximization of spectral efficiency in third-generation
radio access networks is complicated by the need to
provide bandwidth-on-demand to diverse services characterized
by diverse quality of service (QoS) requirements in an interference
limited environment. However, the ability to exploit the full
potential of resource allocation algorithms in third-generation
radio access networks has been limited by the absence of a metric
that captures the two-dimensional radio resource requirement,
in terms of power and bandwidth, in the third-generation radio
access network environment, where different users may have
different signal-to-interference ratio requirements. This paper
presents a novel resource metric as a solution to this fundamental
problem. Also, a novel deadline-driven backoff procedure has
been presented as the backoff scheme of the proposed distributed
scheduling MAC protocols to enable the efficient support of
services with QoS imposed delay constraints without the need
for centralized scheduling. The main conclusion is that low-complexity
distributed scheduling control strategies using overload
avoidance/overload detection can be designed using the proposed
resource metric to give near optimal performance and thus maintain
a high spectral efficiency in third-generation radio access
networks and that importantly overload detection is superior to
overload avoidance
- …