29 research outputs found

    Received Signal Strength for Randomly Distributed Molecular Nanonodes

    Full text link
    We consider nanonodes randomly distributed in a circular area and characterize the received signal strength when a pair of these nodes employ molecular communication. Two communication methods are investigated, namely free diffusion and diffusion with drift. Since the nodes are randomly distributed, the distance between them can be represented as a random variable, which results in a stochastic process representation of the received signal strength. We derive the probability density function of this process for both molecular communication methods. Specifically for the case of free diffusion we also derive the cumulative distribution function, which can be used to derive transmission success probabilities. The presented work constitutes a first step towards the characterization of the signal to noise ratio in the considered setting for a number of molecular communication methods.Comment: 6 pages, 6 figures, Nanocom 2017 conferenc

    Engineering Yeast Cells to Facilitate Information Exchange

    Full text link
    Although continuous advances in theoretical modelling of Molecular Communications (MC) are observed, there is still an insuperable gap between theory and experimental testbeds, especially at the microscale. In this paper, the development of the first testbed incorporating engineered yeast cells is reported. Different from the existing literature, eukaryotic yeast cells are considered for both the sender and the receiver, with {\alpha}-factor molecules facilitating the information transfer. The use of such cells is motivated mainly by the well understood biological mechanism of yeast mating, together with their genetic amenability. In addition, recent advances in yeast biosensing establish yeast as a suitable detector and a neat interface to in-body sensor networks. The system under consideration is presented first, and the mathematical models of the underlying biological processes leading to an end-to-end (E2E) system are given. The experimental setup is then described and used to obtain experimental results which validate the developed mathematical models. Beyond that, the ability of the system to effectively generate output pulses in response to repeated stimuli is demonstrated, reporting one event per two hours. However, fast RNA fluctuations indicate cell responses in less than three minutes, demonstrating the potential for much higher rates in the future.Comment: 18 pages, 9 figures (2 of which are not colored) all .png, recently accepted for publication at TMBM

    Node criticality assessment in a blockchain network

    Get PDF
    Blockchain systems are being rapidly integrated in various technologies, with limited work on the effect of the underlying network topology on the blockchain performance. In this work, we investigate the significance of each network node on the overall blockchain performance. This is assessed by selecting critical nodes according to different criticality metrics, and investigating, using simulations, the degradation in performance incurred upon removing these nodes. The most critical nodes are the ones that incur the greatest degradation in performance. The considered performance metrics are the blockchain size and the packet drop rate. Criticality metrics such as Betweennes Centrality, Closeness Centrality and Degree Centrality are compared. It is found that the Sign Change Spectral Partitioning approach, enhanced with Blockchain Specific traffic flow information, is able to identify critical nodes better in the sense that higher degradation in performance is reported upon their removal

    A lightweight blockchain based two factor authentication mechanism for LoRaWAN join procedure

    Get PDF
    Recently, there has been increasing interest in employing blockchain in different applications, other than crypto-currencies. Blockchains allow a peer to peer distributed network where different nodes communicate with each other, in a trustless manner. Long Range Wide Area Network (LoRaWAN) is an Internet of Things (IoT) technology, which enables long range communication. Although LoRaWAN networks are secure, the LoRaWAN join procedure is susceptible to replay and jamming attacks. Moreover, trust between network server and LoRa end device is the basic foundation of LoRaWAN network however, the centralized nature of network servers raise trust issues between network operators and customers. To solve this problem, we propose a lightweight two factor authentication mechanism for LoRaWAN join procedure, based on blockchain technology. The proposed blockchain based framework provides an extra layer of security for LoRaWAN join procedure and build trust among LoRaWAN network components. The proposed framework is validated using the Ethereum blockchain. The results demonstrate that the proposed framework provides efficient system performance in terms of throughput and latency. The proposed blockchain architecture is a cost effective solution, which can be utilized in the LoRaWAN network with few network servers and LoRa end device, having no strict requirement of throughput and latency

    Energy management in harvesting enabled sensing nodes: prediction and control

    Get PDF
    Energy efficient transmission rate regulation of wireless sensing nodes, is a critical issue when operating in an energy harvesting (EH) enabled environment. In this work, we view the energy management problem as a queue control problem where the objective is to regulate transmission such that the energy level converges to a reference value. We employ a validated non-linear queuing model to derive two non-linear robust throughput controllers. A notable feature of the proposed scheme is its capability of predicting harvest-able energy. The predictions are generated using the proposed Accurate Solar Irradiance prediction Model (ASIM) whose effectiveness in generating accurate both long and short term predictions is demonstrated using real world data. The stability of the proposed controllers is established analytically and the effectiveness of the proposed strategies is demonstrated using simulations conducted on the Network Simulator (NS-3). The proposed policy is successful in guiding the energy level to the reference value, and outperforms the Throughput Optimal (TO) policy in terms of the throughput achieved

    Intelligent Beam Steering for Wireless Communication Using Programmable Metasurfaces

    Get PDF
    Reconfigurable Intelligent Surfaces (RIS) are well established as a promising solution to the blockage problem in millimeter-wave (mm-wave) and terahertz (THz) communications, envisioned to serve demanding networking applications, such as 6G and vehicular. HyperSurfaces (HSF) is a revolutionary enabling technology for RIS, complementing Software Defined Metasurfaces (SDM) with an embedded network of controllers to enhance intelligence and autonomous operation in wireless networks. In this work, we consider feedback-based autonomous reconfiguration of the HSF controller states to establish a reliable communication channel between a transmitter and a receiver via programmable reflection on the HSF when Line-of-sight (LoS) between them is absent. The problem is to regulate the angle of reflection on the metasurface such that the power at the receiver is maximized. Extremum Seeking Control (ESC) is employed with the control signals generated mapped into appropriate metasurface coding signals which are communicated to the controllers via the embedded controller network (CN). This information dissemination process incurs delays which can compromise the stability of the feedback system and are thus accounted for in the performance evaluation. Extensive simulation results demonstrate the effectiveness of the proposed method to maximize the power at the receiver within a reasonable time even when the latter is mobile. The spatiotemporal nature of the traffic for different sampling periods is also characterized

    On the use of programmable metasurfaces in vehicular networks

    Get PDF
    Metasurface-based intelligent reflecting surfaces constitute a revolutionary technology which can serve the purpose of alleviating the blockage problem in mmwave communication systems. In this work, we consider the hypersurface paradigm complementing the software defined metasurface with an embedded controller network in order to facilitate the dissemination of reconfiguration directives to unit cell controllers. For the first time, we describe the methodology with which to characterize the workload within this embedded network in the case of the metasurface tracking multiple users and we use a vehicular communications setting to showcase the methodology. Beyond that, we demonstrate use cases of the workload analysis. We show how the workload characterization can guide the design of information dissemination schemes achieving significant reduction in the network traffic. Moreover, we show how the workload, as a measure of the consumed power, can be used in designing energy efficient communication protocols through a multi-objective optimization problem maximizing the achieved utilization while at the same time minimizing the workload incurred.Peer ReviewedPostprint (author's final draft

    A Congestion Control Algorithm for Max-Min Resource Allocation and Bounded Queue Sizes

    Full text link
    This paper deals with the congestion control problem in computer networks which is viewed as a resource allocation problem constrained by the additional requirement that the queue sizes need to be bounded. We propose a distributed algorithm which converges to the max-min fair allocation of resources among the users of the network and at the same time ensures that the buffers are either empty or track a reference queue size. The problem is formulated mathematically and the proposed algorithm is shown analytically to fulfil the design objectives. The local asymptotic stability of the equilibrium point is established. The problem can be viewed as a hybrid system with changing affine dynamics in different regions of the state space. The transient performance of the proposed algorithm is evaluated through simulations using Matlab. The algorithm can form the basis for the development of an end-to-end communication protocol since it requires no maintenance of per flow states within the network
    corecore