72 research outputs found

    Hop-Based dynamic fair scheduler for wireless Ad-Hoc networks

    Get PDF
    In a typical multihop Ad-Hoc network, interference and contention increase when flows transit each node towards destination, particularly in the presence of cross-traffic. This paper observes the relationship between throughput and path length, self-contention and interference and it investigates the effect of multiple data rates over multiple data flows in the network. Drawing from the limitations of the 802.11 specification, the paper proposes a scheduler named Hop Based Multi Queue (HBMQ), which is designed to prioritise traffic based on the hop count of packets in order to provide fairness across different data flows. The simulation results demonstrate that HBMQ performs better than a Single Drop Tail Queue (SDTQ) scheduler in terms of providing fairness. Finally, the paper concludes with a number of possible directions for further research, focusing on cross-layer implementation to ensure the fairness is also provided at the MAC layer. © 2013 IEEE

    IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN

    Get PDF
    Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of deployment. However, the issues related to security is less explored. The IoT devices are light weight in nature and have low computation power, low battery life and low memory. As incorporating security features are resource expensive, IoT devices are often found to be less protected and in recent times, more IoT devices have been routinely attacked due to high profile security flaws. This paper aims to explore the security vulnerabilities of IoT devices particularly that use Low Power Wide Area Networks (LPWANs). In this work, LoRaWAN based IoT security vulnerabilities are scrutinised and loopholes are identified. An attack was designed and simulated with the use of a predictive model of the device data generation. The paper demonstrated that by predicting the data generation model, jamming attack can be carried out to block devices from sending data successfully. This research will aid in the continual development of any necessary countermeasures and mitigations for LoRaWAN and LPWAN functionality of IoT networks in general

    Queue utilization with hop based enhanced arbitrary inter frame spacing MAC for saturated ad HOC networks

    Get PDF
    © 2015 IEEE. Path length of a multi hop Ad Hoc networks has an adverse impact on the end-to-end throughput especially during network saturation. The success rate of forwarding packets towards destination is limited due to interference, contention, limited buffer space, and bandwidth. Real time applications streaming data fill the buffer space at a faster rate at the source and its nearby forwarding nodes since the channel is shared. The aim of this paper is to increase the success rate of forwarding the packets to yield a higher end-to-end throughput. In order to reduce loss of packets due to buffer overflow and enhance the performance of the network for a saturated network, a novel MAC protocol named Queue Utilization with Hop Based Enhanced Arbitrary Inter Frame Spacing based (QU-EAIFS) MAC is proposed for alleviating the problems in saturated Ad Hoc networks. The protocol prioritises the nodes based on its queue utilization and hops travelled by the packet and it helps achieving higher end-toend performance by forwarding the packets with higher rate towards the destination during network saturation. The proposed MAC enhances the end-to-end performance by approximately 40% and 34% for a 5hop and 6hop communication respectively in a chain topology as compared to the standard IEEE802.11b. The performance of the new MAC also outperforms the performance of IEEE 802.11e MAC. In order to validate the protocol, it is also tested with short hops and varying packet sizes and more realistic random topologies

    Dynamic Queue Utilization Based MAC for multi-hop Ad Hoc networks

    Get PDF
    The end-to-end throughput in single flow multi-hop Ad Hoc networks decays rapidly with path length. Along the path, the success rate of delivering packets towards the destination decreases due to higher contention, interference, limited buffer size and limited shared bandwidth constraints. In such environments the queues fill up faster in nodes closer to the source than in the nodes nearer the destination. In order to reduce buffer overflow and improve throughput for a saturated network, this paper introduces a new MAC protocol named Dynamic Queue Utilization Based Medium Access Control (DQUB-MAC). The protocol aims to prioritise access to the channel for queues with higher utilization and helps in achieving higher throughput by rapidly draining packets towards the destination. The proposed MAC enhances the performance of an end-to-end data flow by up to 30% for a six hop transmission in a chain topology and is demonstrated to remain competitive for other network topologies and for a variety of packet sizes

    Hacking NHS Pacemakers: A Feasibility Study

    Get PDF
    Pacemakers are common types of implants, in recent years there have been growing concerns around the security within these devices. This paper was created with the assistance of the NHS staff at NGH, it attempts to answer the question of if it is feasible to hack current models of NHS pacemakers. The experiments performed were done so in the mindset of an average hacker, not a team of experts with access to the required knowledge and equipmen

    Will Blockchain technology become a reality in sensor networks?

    Get PDF
    The need for sensors to deliver, communicate, collect, alert, and share information in various applications has made wireless sensor networks very popular. However, due to its limited resources in terms of computation power, battery life and memory storage of the sensor nodes, it is challenging to add security features to provide the confidentiality, integrity, and availability. In order to communicate reliably with trust and authenticity, providing data and system security especially for those sensors dealing with sensitive data related to healthcare, military activity, environmental sensing for weather prediction or seismic data etc. is vital. Blockchain technology ensures security and avoids the need of any trusted third party for security. However, applying Blockchain in a resource-constrained wireless sensor network is a challenging task because Blockchain is power, computation, and memory hungry in nature and demands heavy bandwidth due to control overheads. In this paper, a new routing and a private communication Blockchain framework is designed and tested with sensors generating constant and continuous data (like voice and video). However, it is realized that even if computation and bandwidth requirements are taken for granted, storage and battery life will cripple the sustainability of Blockchain application in sensor networks especially for high data generating sensors. The proposed Load Balancing Multi- Hop (LBMH) routing shares and enhances the battery life of the Cluster Heads and reduce control overhead during Block updates, but due to limited storage and energy of the sensor nodes, Blockchain in sensor networks may never be a reality unless storage and battery life of sensor devices are not limited on the one hand and computation power and bandwidth availability are high, on the other

    Location based transmission using a neighbour aware-cross layer MAC for ad hoc networks

    Get PDF
    In a typical Ad Hoc network, mobile nodes have scarce shared bandwidth and limited battery life resources, so optimizing the resource and enhancing the overall network performance is the ultimate aim in such network. This paper proposes anew cross layer MAC algorithm called Location Based Transmission using a Neighbour Aware – Cross Layer MAC (LBT-NA Cross Layer MAC) that aims to reduce the transmission power when communicating with the intended receiver by exchanging location information between nodes in one hand and on the other hand the MAC uses a new random backoff values, which is based on the number of active neighbour nodes, unlike the standard IEEE 802.11 series where a random backoff value is chosen from a fixed range of 0-31. The validation test demonstrates that the proposed algorithm increases battery life, increases spatial reuse and enhances the network performance

    Dynamic neighbour aware power-controlled MAC for multi-hop ad hoc networks

    Get PDF
    In Ad Hoc networks, resources in terms of bandwidth and battery life are limited; so using a fixed high transmission power limits the durability of a battery life and causes unnecessary high interference while communicating with closer nodes leading to lower overall network throughput. Thus, this paper proposes a new cross layer MAC called Dynamic Neighbour Aware Power-controlled MAC (Dynamic NA -PMAC) for multi-hop Ad Hoc networks that adjust the transmission power by estimating the communication distance based on the overheard signal strength. By dynamically controlling the transmission power based on the receivable signal strength, the probability of concurrent transmission, durability of battery life and bandwidth utilization increases. Moreover, in presence of multiple overlapping signals with different strengths, an optimal transmission power is estimated dynamically to maintain fairness and avoid hidden node issues at the same time. In a given area, since power is controlled, the chances of overlapping the sensing ranges of sources and next hop relay nodes or destination node decreases, so it enhances the probability of concurrent transmission and hence an increased overall throughput. In addition, this paper uses a variable backoff algorithm based on the number of active neighbours, which saves energy and increases throughput when the density of active neighbours is less. The designed mechanism is tested with various random network scenarios using different traffic including CBR, Exponential and TCP in both scenarios (stationary and mobile with high speed) for single as well as multi-hop. Moreover, the proposed model is benchmarked against two variants of power-controlled mechanisms namely Min NA-PMAC and MaxRC-MinDA NA-PMAC to prove that using a fixed minimum transmission power may lead to unfair channel access and using different transmission power for RTS/CTS and Data/ACK leads to lower probability of concurrent transmission respectively

    OPTIMISING APPLICATION PERFORMANCE WITH QOS SUPPORT IN AD HOC NETWORKS

    Get PDF
    The popularity of wireless communication has increased substantially over the last decade, due to mobility support, flexibility and ease of deployment. Among next generation of mobile communication technologies, Ad Hoc networking plays an important role, since it can stand alone as private network, become a part of public network, either for general use or as part of disaster management scenarios. The performance of multihop Ad Hoc networks is heavily affected by interference, mobility, limited shared bandwidth, battery life, error rate of wireless media, and the presence of hidden and exposed terminals. The scheduler and the Medium Access Control (MAC) play a vital role in providing Quality of Service (QoS) and policing delay, end-to-end throughput, jitter, and fairness for user application services. This project aims to optimise the usage of the available limited resources in terms of battery life and bandwidth, in order to reduce packet delivery time and interference, enhance fairness, as well as increase the end-to-end throughput, and increase the overall network performance. The end-to-end throughput of an Ad Hoc network decays rapidly as the hop count between the source and destination pair increases and additional flows injected along the path of an existing flow affects the flows arriving from further away; in order to address this problem, the thesis proposes a Hop Based Dynamic Fair Scheduler that prioritises flows subject to the hop count of frames, leading to a 10% increase in fairness when compared to a IEEE 802.11b with single queue. Another mechanism to improve network performance in high congestion scenarios is network-aware queuing that reduces loss and improve the end-to-end throughput of the communicating nodes, using a medium access control method, named Dynamic Queue Utilisation Based Medium Access Control (DQUB-MAC). This MAC provides higher access probability to the nodes with congested queue, so that data generated at a high rate can be forwarded more effectively. Finally, the DQUB-MAC is modified to take account of hop count and a new MAC called Queue Utilisation with Hop Based Enhanced Arbitrary Inter Frame Spacing (QU-EAIFS) is also designed in this thesis. Validation tests in a long chain topology demonstrate that DQUB-MAC and QU-EAIFS increase the performance of the network during saturation by 35% and 40% respectively compared to IEEE 802.11b. High transmission power leads to greater interference and represents a significant challenge for Ad Hoc networks, particularly in the context of shared bandwidth and limited battery life. The thesis proposes two power control mechanisms that also employ a random backoff value directly proportional to the number of the active contending neighbours. The first mechanism, named Location Based Transmission using a Neighbour Aware with Optimised EIFS for Ad Hoc Networks (LBT-NA with Optimised EIFS MAC), controls the transmission power by exchanging location information between the communicating nodes in order to provide better fairness through a dynamic EIFS based on the overheard packet length. In a random topology, with randomly placed source and destination nodes, the performance gain of the proposed MAC over IEEE 802.11b ranges from approximately 3% to above 90% and the fairness index improved significantly. Further, the transmission power is directly proportional to the distance of communication. So, the performance is high and the durability of the nodes increases compared to a fixed transmission power MAC such as IEEE 802.11b when communicating distance is shorter. However, the mechanism requires positional information, therefore, given that location is typically unavailable, a more feasible power control cross layered system called Dynamic Neighbour Aware – Power controlled MAC (Dynamic NA -PMAC)is designed to adjust the transmission power by estimating the communicating distance based on the estimated overheard signal strength. In summary, the thesis proposes a number of mechanisms that improve the fairness amongst the competing flows, increase the end-to-end throughput, decrease the delay, reduce the transmission power in Ad Hoc environments and substantially increase the overall performance of the network
    • …
    corecore