73 research outputs found

    Multi-Tier Diversified Service Architecture for Internet 3.0: The Next Generation Internet

    Get PDF
    The next generation Internet needs to support multiple diverse application contexts. In this paper, we present Internet 3.0, a diversified, multi-tier architecture for the next generation Internet. Unlike the current Internet, Internet 3.0 defines a new set of primitives that allows diverse applications to compose and optimize their specific contexts over resources belonging to multiple ownerships. The key design philosophy is to enable diversity through explicit representation, negotiation and enforcement of policies at the granularity of network infrastructure, compute resources, data and users. The basis of the Internet 3.0 architecture is a generalized three-tier object model. The bottom tier consists of a high-speed network infrastructure. The second tier consists of compute resources or hosts. The third tier consists of data and users. The “tiered” organization of the entities in the object model depicts the natural dependency relationship between these entities in a communication context. All communication contexts, including the current Internet, may be represented as special cases within this generalized three-tier object model. The key contribution of this paper is a formal architectural representation of the Internet 3.0 architecture over the key primitive of the “Object Abstraction” and a detailed discussion of the various design aspects of the architecture, including the design of the “Context Router-” the key architectural element that powers an evolutionary deployment plan for the clean slate design ideas of Internet 3.0

    Adaptive Membership Selection Criteria using Genetic Algorithms for Fuzzy Centroid Localizations in Wireless Sensor Network

    Get PDF
    This paper investigates the effect of fuzzy inputs, i.e., signal strength, of various known nodes, to fuzzy logic systems in order to derive a proper weight for Centroid, properly used to approximate the location in wireless sensor networks with its key advantage on simplicity but with precision trade-off. Due to a fluctuation behavior of location estimation precisions with respect to a diversity of various inputs, here, we propose the use of heuristic approach applying genetic algorithms with mutation and cross-over steps to adaptively seek the optimal solution – a proper number of membership functions for fuzzy logic systems in weighted Centroid – to achieve higher location estimation accuracy. The performance of our methodology is effectively confirmed by the intensive evaluation on a large scale simulation in various topologies and node densities against fixed membership function scenarios including a traditional Centroi

    Capacity Evaluation for IEEE 802.16e Mobile WiMAX

    Get PDF
    We present a simple analytical method for capacity evaluation of IEEE 802.16e Mobile WiMAX networks. Various overheads that impact the capacity are explained and methods to reduce these overheads are also presented. The advantage of a simple model is that the effect of each decision and sensitivity to various parameters can be seen easily. We illustrate the model by estimating the capacity for three sample applications—Mobile TV, VoIP, and data. The analysis process helps explain various features of IEEE 802.16e Mobile WiMAX. It is shown that proper use of overhead reducing mechanisms and proper scheduling can make an order of magnitude difference in performance. This capacity evaluation method can also be used for validation of simulation models

    Radio Irregularity Obstacles-Aware Model for Wireless Sensor Networks

    Get PDF
    Radio irregularity and signal attenuation are common phenomena in wireless sensor networks (WSNs) caused by many factors, such as the impact of environmental characteristics, the non-isotropic path losses, and especially, the obstacle on the transmission (multi) paths. The diversity of these phenomena make difficulty for accurate evaluation of WSNs’ applications which specifically require high coverage and connectivity. Thus, in this paper, we investigated the radio irregularity and signal power attenuation, primarily due to the obstacle in WSNs. With empirical data obtained from experiments using a well-known sensor node,i.e., MICAz, we found that the signal strength attenuation is different in each case according to obstacle characteristics. Then, we proposed a radio model, called Radio Irregularity Obstacle-Aware Model (RIOAM). The results obtained from real measurements are also supported with regard to those from the simulation. Our model effectiveness is justified against a radio irregularity model (RIM) – higher precision with the existence of obstacles in WSNs

    Video Steganography with LSB Color Detection

    Get PDF
    Steganography is the method employed to prevent unsolicited access and malicious use of sensitive information. This research proposes an alternative approach to video steganography by exploiting Least Significant Bit (LSB) in the binary stream. Its main contribution is incorporating a color detection technique to optimize steganographic performance. The proposed encoding and decoding methods were implemented on MATLAB software to illustrate its applicability on uncompressed AVI movie. The results showed that it could conceal text, image, audio, and video data with non-secret streams. In this study, Peak Signal to Noise Ratio (PSNR) was used to assess its performance, whereby significant improvement over generic methods was foun

    Secrecy outage performance analysis for energy harvesting sensor networks with a jammer using relay selection strategy

    Get PDF
    In this paper, we study radio frequency energy harvesting (EH) in a wireless sensor network in the presence of multiple eavesdroppers (EAVs). Specifically, the sensor source and multiple sensor relays harvest energy from multiple power transfer stations (PTSs), and then, the source uses this harvested energy to transmit information to the base station (BS) with the help of the relays. During the transmission of information, the BS typically faces a risk of losing information due to the EAVs. Thus, to enhance the secrecy of the considered system, one of the relays acts as a jammer, using harvested energy to generate interference with the EAVs. We propose a best-relay-and-best-jammer scheme for this purpose and compare this scheme with other previous schemes. The exact closed-form expression for the secrecy outage probability (SOP) is obtained and is validated through Monte Carlo simulations. A near-optimal EH time algorithm is also proposed. In addition, the effects on the SOP of key system parameters such as the EH efficiency coefficient, the EH time, the distance between the relay and BS, the number of PTSs, the number of relays, and the number of EAVs are investigated. The results indicate that the proposed scheme generally outperforms both the best-relay-and-random-jammer scheme and the random-relay-and-best-jammer scheme in terms of the secrecy capacity
    • …
    corecore