88 research outputs found

    Modelling network memory servers with parallel processors, break-downs and repairs.

    Get PDF
    This paper presents an analytical method for the performability evaluation of a previously reported network memory server attached to a local area network. To increase the performance and availability of the proposed system, an additional server is added to the system. Such systems are prone to failures. With this in mind, a mathematical model has been developed to analyse the performability of the proposed system with break-downs and repairs. Mean queue lengths and the probability of job losses for the LAN feeding the network memory server is calculated and presented

    Seamless key agreement framework for mobile-sink in IoT based cloud-centric secured public safety sensor networks

    Get PDF
    Recently, the Internet of Things (IoT) has emerged as a significant advancement for Internet and mobile networks with various public safety network applications. An important use of IoT-based solutions is its application in post-disaster management, where the traditional telecommunication systems may be either completely or partially damaged. Since enabling technologies have restricted authentication privileges for mobile users, in this paper, a strategy of mobile-sink is introduced for the extension of user authentication over cloud-based environments. A seamless secure authentication and key agreement (S-SAKA) approach using bilinear pairing and elliptic-curve cryptosystems is presented. It is shown that the proposed S-SAKA approach satisfies the security properties, and as well as being resilient to nodecapture attacks, it also resists significant numbers of other well-known potential attacks related with data confidentiality, mutual authentication, session-key agreement, user anonymity, password guessing, and key impersonation. Moreover, the proposed approach can provide a seamless connectivity through authentication over wireless sensor networks to alleviate the computation and communication cost constraints in the system. In addition, using Burrows–Abadi–Needham logic, it is demonstrated that the proposed S-SAKA framework offers proper mutual authentication and session key agreement between the mobile-sink and the base statio

    Analytical Modelling and Performability Evaluation of Multi-Channel WLANs with Global Failures

    Get PDF
    Wireless local area networks (WLANs) which are based on IEEE 802.11 standard are used widely in existing local area network configurations. IEEE 802.11 offers multiple non-overlapping channels to increase the capacity of the network. There are strong evidences that WLANs are prone to impairments. In order to improve the quality of service (QoS) and to evaluate the performance of WLANs realistically, the availability of the systems should be considered. This paper studies performability evaluation of a multi-channel WLAN using analytical modelling approach. Unlike the existing studies, the failures of the overall system, where a critical function unit fails making all the channels unavailable are considered. A new term is introduced as global failures. It is possible to solve the models considered using matrix geometric method where system parameters and minimal non negative solution R is computed by an iterative method. However spectral expansion method is a well-known alternative where the iterative calculations for solving R is avoided using eigenvalues and eigenvectors. The exact spectral expansion method is employed to obtain performability measures such as mean queue length and blocking probability. Iterative refinements are employed in solution of simultaneous equations

    On demand multicast routing in wireless sensor networks

    Get PDF
    The wireless networking environment presents imposing challenges to the study of broadcasting and multicasting problems. Developing an algorithm to optimize communication amongst a group of spatially distributed sensor nodes in a WSN (Wireless Sensor Network) has been met with a number challenges due to the characterization of the sensor node device. These challenges include, but are not limited to: energy, memory, and throughput constraints. The traditional approach to overcome these challenges have emphasised the development of low power electronics, efficient modulation, coding, antenna design etc., it has been recognised that networking techniques can also have a strong impact on the energy efficiency of such systems. A variety of networking based approaches to energy efficiency are possible. One of the well-known approaches is to apply clustering techniques to effectively establish an ordered connection of sensor nodes whilst improving the overall network lifetime. This paper proposes an improved clustering based multicast approach that allows any cluster head to be a multicast source with an unlimited number of subscribers, to optimize group communication in WSNs whilst ensuring sensor nodes do not deprecate rapidly in energy levels. We review several clustering approaches and examine multicast versus broadcast communication in WSNs

    On the performance, availability and energy consumption modelling of clustered IoT systems

    Get PDF
    Wireless sensor networks (WSNs) form a large part of the ecosystem of the Internet of Things (IoT), hence they have numerous application domains with varying performance and availability requirements. Limited resources that include processing capability, queue capacity, and available energy in addition to frequent node and link failures degrade the performance and availability of these networks. In an attempt to efficiently utilise the limited resources and to maintain the reliable network with efficient data transmission; it is common to select a clustering approach, where a cluster head is selected among the diverse IoT devices. This study presents the stochastic performance as well as the energy evaluation model for WSNs that have both node and link failures. The model developed considers an integrated performance and availability approach. Various duty cycling schemes within the medium-access control of the WSNs are also considered to incorporate the impact of sleeping/idle states that are presented using analytical modeling. The results presented using the proposed analytical models show the effects of factors such as failures, various queue capacities and system scalability. The analytical results presented are in very good agreement with simulation results and also present an important fact that the proposed models are very useful for identification of thresholds between WSN system characteristics

    Relay selection for efficient HARQ-IR protocols in relay-assisted multisource multicast networks

    Get PDF
    This paper investigates relay selection for reliable data transmission in relay-assisted multisource multicast networks (RMMNs) where multiple source nodes distribute information to a set of destination nodes with the assistance of multiple relay nodes. Hybrid automatic repeat request with incremental redundancy (HARQ-IR) is used and supported by either a physical-layer network coding (PNC) or an analog network coding (ANC) technique employed at the relays. By deriving efficiency metrics of the HARQ-IR protocols, we propose relay selection schemes for RMMNs to minimize the transmission delay and energy consumption. Simulation results are provided to analyse each relay selection scheme

    Secure wireless powered and cooperative jamming D2D communications

    Get PDF
    This paper investigates a secure wireless-powered device-to-device (D2D) communication network in the presence of multiple eavesdroppers, where a hybrid base station (BS) in a cellular network not only provides power wirelessly for the D2D transmitter to guarantee power efficiency for the D2D network, but also serves as a cooperative jammer (CJ) to interfere with the eavesdroppers. The cellular and D2D networks can belong to different service providers, which means that the D2D transmitter would need to pay for the energy service released by the hybrid BS to guarantee secure D2D communication. In order to exploit the hierarchical interaction between the BS and the D2D transmitter, we first formulate a Stackelberg game based energy trading scheme, where the quadratic energy cost model is considered. Then, a non-energy trading based Stackelberg game is investigated to study the reversed roles of the BS and the D2D users. For comparison, we also formulate and resolve the social welfare optimization problem. We derive the closed-form Stackelberg equilibriums of the formulated games and the optimal solutions for the social welfare optimization problem. Simulation results are provided to validate our proposed schemes to highlight the importance of energy trading interaction between cellular and D2D networks

    Packet arrival analysis in wireless sensor networks

    Get PDF
    Distributed sensor networks have been discussed for more than 30 years, but the vision of Wireless Sensor Networks (WSNs) has been brought into reality only by the rapid advancements in the areas of sensor design, information technologies, and wireless networks that have paved the way for the proliferation of WSNs. The unique characteristics of sensor networks introduce new challenges, amongst which prolonging the sensor lifetime is the most important. WSNs have seen a tremendous growth in various application areas including health care, environmental monitoring, security, and military purposes despite prominent performance and availability challenges. Clustering plays an important role in enhancement of the life span and scalability of the network, in such applications. Although researchers continue to address these grand challenges, the type of distributions for arrivals at the cluster head and intermediary routing nodes is still an interesting area of investigation. Modelling the behaviour of the networks becomes essential for estimating the performance metrics and further lead to decisions for improving the network performance, hence highlighting the importance of identifying the type of inter-arrival distributions at the cluster head. In this paper, we present extensive discussions on the assumptions of exponential distributions in WSNs, and present numerical results based on Q-Q plots for estimating the arrival distributions. The work is further extended to understand the impact of end-to-end delay and its effect on inter-arrival time distributions, based on the type of medium access control used in WSNs. Future work is also presented on the grounds that such comparisons based on simple eye checks are insufficient. Since in many cases such plots may lead to incorrect conclusions, demanding the necessity for validating the types of distributions. Statistical analysis is necessary to estimate and validate the empirical distributions of the arrivals in WSNs
    • …
    corecore