66 research outputs found

    Spatial correlation based low energy aware clustering (LEACH) in a wireless sensor networks

    Get PDF
    In this paper, an enhanced Low Energy Aware Cluster Head (LEACH) protocol is proposed. It applies aggregation strategies in the area monitored by sensor nodes to reduce the number of reports sent to sink and to save energy. The basic idea is to weight the information sensed by sensors based on the distortion area in order to estimate better the event at the sink node. This approach seeks to exploit the spatial correlation among nodes and among clusters to assign different importance to the information aggregated and forwarded by the cluster head nodes. A multi-zone monitoring related to clusters is proposed, and a dynamic weights management is presented to consider distortion at cluster level introduced in the event estimation. A mathematical formulation of the problem and the proposal to weight space and data information is led out. Simulation campaigns in Matlab show the effectiveness of the event estimation in terms of event estimation distortion and network lifetime

    Energy Issues and Energy Aware Routing in Wireless Ad Hoc Networks

    Get PDF

    Vehicular networks and road safety: an application for emergency/danger situations management using the WAVE/802.11p standard

    Get PDF
    Car-to-car communication makes possible offering many services for vehicular environment, mainly to improve the safety. The decentralized kind of these networks requires new protocols to distribute information. The advantages that it offers depend on the penetration rate, that will be enough only after years since the introduction, due to the longevity of the current cars. The V2X communication requires On-Board Units (OBUs) in the vehicles, and Road-Side Units (RSUs) on the roads. The proposed application uses the peculiarities of the VANETs to advise danger or emergency situations with V2V and V2I message exchange. IEEE 802.11p is standard on which the communication is based, that provides the physical and the MAC layers. The WAVE protocol uses this standard, implementing other protocols defined by the family of standards IEEE P1609 in the upper layers. They define security services, resource management, multichannel operations and the message exchange protocol in WAVE. The performance of the application will be evaluated through many simulations executed in different scenarios, to provide general data independent from them

    Opportunistic Interference Cancellation Evaluation in Cognitive Radios under Power Control Strategies

    Get PDF

    Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i

    Get PDF
    This paper focuses on WPA and IEEE 802.11i protocols that represent two important solutions in the wireless environment. Scenarios where it is possible to produce a DoS attack and DoS flooding attacks are outlined. The last phase of the authentication process, represented by the 4-way handshake procedure, is shown to be unsafe from DoS attack. This can produce the undesired effect of memory exhaustion if a flooding DoS attack is conducted. In order to avoid DoS attack without increasing the complexity of wireless mobile devices too much and without changing through some further control fields of the frame structure of wireless security protocols, a solution is found and an extension of WPA and IEEE 802.11 is proposed. A protocol extension with three "static" variants and with a resource-aware dynamic approach is considered. The three enhancements to the standard protocols are achieved through some simple changes on the client side and they are robust against DoS and DoS flooding attack. Advantages introduced by the proposal are validated by simulation campaigns and simulation parameters such as attempted attacks, successful attacks, and CPU load, while the algorithm execution time is evaluated. Simulation results show how the three static solutions avoid memory exhaustion and present a good performance in terms of CPU load and execution time in comparison with the standard WPA and IEEE 802.11i protocols. However, if the mobile device presents different resource availability in terms of CPU and memory or if resource availability significantly changes in time, a dynamic approach that is able to switch among three different modalities could be more suitable

    routing in mobile opportunistic social networks with selfish nodes

    Get PDF
    When the connection to Internet is not available during networking activities, an opportunistic approach exploits the encounters between mobile human-carried devices for exchanging information. When users encounter each other, their handheld devices can communicate in a cooperative way, using the encounter opportunities for forwarding their messages, in a wireless manner. But, analyzing real behaviors, most of the nodes exhibit selfish behaviors, mostly to preserve the limited resources (data buffers and residual energy). That is the reason why node selfishness should be taken into account when describing networking activities: in this paper, we first evaluate the effects of node selfishness in opportunistic networks. Then, we propose a routing mechanism for managing node selfishness in opportunistic communications, namely, SORSI (Social-based Opportunistic Routing with Selfishness detection and Incentive mechanisms). SORSI exploits the social-based nature of node mobility and other social features of nodes to optimize message dissemination together with a selfishness detection mechanism, aiming at discouraging selfish behaviors and boosting data forwarding. Simulating several percentages of selfish nodes, our results on real-world mobility traces show that SORSI is able to outperform the social-based schemes Bubble Rap and SPRINT-SELF, employing also selfishness management in terms of message delivery ratio, overhead cost, and end-to-end average latency. Moreover, SORSI achieves delivery ratios and average latencies comparable to Epidemic Routing while having a significant lower overhead cost

    Routing Optimization in Vehicular Networks: A New Approach Based on Multiobjective Metrics and Minimum Spanning Tree

    Get PDF
    Recently, distributed mobile wireless computing is becoming a very important communications paradigm, due to its flexibility to adapt to different mobile applications. As many other distributed networks, routing operations assume a crucial importance in system optimization, especially when considering dense urban areas, where interference effects cannot be neglected. In this paper a new routing protocol for VANETs and a new scheme of multichannel management are proposed. In particular, an interference-aware routing scheme, for multiradio vehicular networks, wherein each node is equipped with a multichannel radio interface is investigated. NS-2 has been used to validate the proposed Multiobjective routing protocol (MO-RP) protocol in terms of packet delivery ratio, throughput, end-to-end delay, and overhead

    Smart Antenna Systems Model Simulation Design for 5G Wireless Network Systems

    Get PDF
    The most recent antenna array technologies such as smart antenna systems (SAS) and massive multiple input multiple output (MIMO) systems are giving a strong increasing impact relative to 5G wireless communication systems due to benefits that they could introduce in terms of performance improvements with respect to omnidirectional antennas. Although a considerable number of theoretical proposals already exist in this field, the most common used network simulators do not implement the latest wireless network standards and, consequently, they do not offer the possibility to emulate scenarios in which SAS or massive MIMO systems are employed. This aspect heavily affects the quality of the network performance analysis with regard to the next generation wireless communication systems. To overcome this issue, it is possible, for example, to extend the default features offered by one of the most used network simulators such as Omnet++ which provides a very complete suite of network protocols and patterns that can be adapted in order to support the latest antenna array systems. The main goal of the present chapter is to illustrate the improvements accomplished in this field allowing to enhance the basic functionalities of the Omnet++ simulator by implementing the most modern antenna array technologies
    corecore