首页 > 最新文献

2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks最新文献

英文 中文
Heterogeneity in contact dynamics: Helpful or harmful to forwarding algorithms in DTNs? 接触动力学的异质性:对DTNs中的转发算法有益还是有害?
Chul-Ho Lee, Do Young Eun
In this paper we focus on how the heterogeneous contact dynamics of mobile nodes impact the performance of forwarding/routing algorithms in delay/disruption-tolerant networks (DTNs). To this end, we consider two representative heterogeneous network models, each of which captures heterogeneity among node pairs (individual) and heterogeneity in underlying environment (spatial), respectively, and examine the full extent of difference in delay performances they cause on forwarding/routing algorithms through formal stochastic comparisons. We first show that these heterogeneous models correctly capture non-Poisson contact dynamics observed in real traces. Then, we consider direct forwarding and multicopy two-hop relay protocol and rigorously establish stochastic/convex ordering relationships on their delay performances under these heterogeneous models and the corresponding homogeneous model, all of which have the same average inter-contact time over all node pairs. We show that heterogeneous models predict an entirely opposite ordering relationship in the delay performances depending on which of the two heterogeneities is captured. This suggests that merely capturing non-Poisson contact dynamics - even if the entire distribution of aggregated inter-contact time is precisely matched, is not enough and that one should carefully evaluate the performance of forwarding/routing algorithms under a properly chosen heterogeneous network setting. Our results will also be useful in correctly exploiting the underlying heterogeneity structure so as to achieve better performance in DTNs.
在本文中,我们重点研究了移动节点的异构接触动态如何影响延迟/容错网络(DTNs)中转发/路由算法的性能。为此,我们考虑了两个具有代表性的异构网络模型,每个模型分别捕获节点对(个体)之间的异质性和底层环境(空间)中的异质性,并通过形式随机比较检查它们对转发/路由算法造成的延迟性能差异的全部程度。我们首先证明这些异质模型正确地捕获了在真实轨迹中观察到的非泊松接触动力学。然后,我们考虑了直接转发和多拷贝两跳中继协议,并在这些异构模型和相应的齐次模型下严格建立了它们的延迟性能的随机/凸排序关系,这些模型在所有节点对上都具有相同的平均接触时间。我们证明了异构模型预测了完全相反的延迟性能顺序关系,这取决于捕获了两种异构中的哪一种。这表明,仅仅捕获非泊松接触动态——即使聚合的相互接触时间的整个分布是精确匹配的——是不够的,人们应该仔细评估在适当选择的异构网络设置下转发/路由算法的性能。我们的结果也将有助于正确地利用潜在的异质性结构,从而在ddn中获得更好的性能。
{"title":"Heterogeneity in contact dynamics: Helpful or harmful to forwarding algorithms in DTNs?","authors":"Chul-Ho Lee, Do Young Eun","doi":"10.1109/WIOPT.2009.5291640","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291640","url":null,"abstract":"In this paper we focus on how the heterogeneous contact dynamics of mobile nodes impact the performance of forwarding/routing algorithms in delay/disruption-tolerant networks (DTNs). To this end, we consider two representative heterogeneous network models, each of which captures heterogeneity among node pairs (individual) and heterogeneity in underlying environment (spatial), respectively, and examine the full extent of difference in delay performances they cause on forwarding/routing algorithms through formal stochastic comparisons. We first show that these heterogeneous models correctly capture non-Poisson contact dynamics observed in real traces. Then, we consider direct forwarding and multicopy two-hop relay protocol and rigorously establish stochastic/convex ordering relationships on their delay performances under these heterogeneous models and the corresponding homogeneous model, all of which have the same average inter-contact time over all node pairs. We show that heterogeneous models predict an entirely opposite ordering relationship in the delay performances depending on which of the two heterogeneities is captured. This suggests that merely capturing non-Poisson contact dynamics - even if the entire distribution of aggregated inter-contact time is precisely matched, is not enough and that one should carefully evaluate the performance of forwarding/routing algorithms under a properly chosen heterogeneous network setting. Our results will also be useful in correctly exploiting the underlying heterogeneity structure so as to achieve better performance in DTNs.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"317 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115938277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Battery recovery aware sensor networks 电池回收感知传感器网络
Chi-Kin Chau, M. H. Wahab, Fei Qin, Yunsheng Wang, Yang Yang
Many applications of sensor networks require batteries as the energy source, and hence critically rely on energy optimisation of sensor batteries. But as often neglected by the networking community, most batteries are non-ideal energy reservoirs and can exhibit battery recovery effect — the deliverable energy in batteries can be replenished per se, if left idling for sufficient duration. We made several contributions towards harnessing battery recovery effect in sensor networks. First, we empirically examine the gain of battery runtime due to battery recovery effect, and found this effect significant and duration-dependent. Second, based on our findings, we model the battery recovery effect in the presence of random sensing activities by a Markov chain model, and study the effect of duty cycling and buffering to harness battery recovery effect. Third, we propose a more energy-efficient duty cycling scheme that is aware of battery recovery effect, and analyse its performance with respect to the latency of data delivery.
传感器网络的许多应用都需要电池作为能量来源,因此严重依赖于传感器电池的能量优化。但是,正如经常被网络社区所忽视的那样,大多数电池都不是理想的能量储存器,并且可以表现出电池回收效应——如果闲置足够长的时间,电池中的可交付能量可以自行补充。我们在利用传感器网络中的电池回收效应方面做出了一些贡献。首先,我们实证检验了由于电池回收效应而增加的电池运行时间,发现这种效应显著且依赖于持续时间。其次,在此基础上,利用马尔可夫链模型对随机感知活动下的电池回收效应进行建模,并研究了占空比和缓冲对电池回收效应的影响。第三,我们提出了一种更节能的占空比方案,该方案意识到电池回收效应,并分析了其在数据传输延迟方面的性能。
{"title":"Battery recovery aware sensor networks","authors":"Chi-Kin Chau, M. H. Wahab, Fei Qin, Yunsheng Wang, Yang Yang","doi":"10.1109/WIOPT.2009.5291623","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291623","url":null,"abstract":"Many applications of sensor networks require batteries as the energy source, and hence critically rely on energy optimisation of sensor batteries. But as often neglected by the networking community, most batteries are non-ideal energy reservoirs and can exhibit battery recovery effect — the deliverable energy in batteries can be replenished per se, if left idling for sufficient duration. We made several contributions towards harnessing battery recovery effect in sensor networks. First, we empirically examine the gain of battery runtime due to battery recovery effect, and found this effect significant and duration-dependent. Second, based on our findings, we model the battery recovery effect in the presence of random sensing activities by a Markov chain model, and study the effect of duty cycling and buffering to harness battery recovery effect. Third, we propose a more energy-efficient duty cycling scheme that is aware of battery recovery effect, and analyse its performance with respect to the latency of data delivery.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115322203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
The impact of directional antenna models on simulation accuracy 定向天线模型对仿真精度的影响
E. Anderson, Gary V. Yee, Caleb T. Phillips, D. Sicker, D. Grunwald
Increasingly, directional antennas are being used in wireless networks. Such antennas can improve the quality of individual links and decrease overall interference. However, the interaction of environmental effects with signal directionality is not well understood. We observe that state of the art simulators make simplifying assumptions which are often unrealistic and can give a misleading picture of application layer performance. Because simulators are often used for prototyping and validating new ideas, their realism and accuracy are of primary importance. In this paper, we apply a new empirical simulation method for directional antennas and study how well this models reality. We show that not only is our model easy to implement, but is also more accurate and thus better able to predict the performance of propagation-sensitive applications.
定向天线越来越多地应用于无线网络。这种天线可以提高单个链路的质量,减少总体干扰。然而,环境效应与信号方向性的相互作用尚不清楚。我们观察到,最先进的模拟器做出了简化的假设,这些假设通常是不现实的,并且可能给出应用层性能的误导性图像。因为模拟器经常用于制作原型和验证新想法,所以它们的真实感和准确性至关重要。本文采用了一种新的定向天线经验仿真方法,并研究了该方法对实际情况的模拟效果。我们表明,我们的模型不仅易于实现,而且更准确,因此能够更好地预测传播敏感应用程序的性能。
{"title":"The impact of directional antenna models on simulation accuracy","authors":"E. Anderson, Gary V. Yee, Caleb T. Phillips, D. Sicker, D. Grunwald","doi":"10.1109/WIOPT.2009.5291643","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291643","url":null,"abstract":"Increasingly, directional antennas are being used in wireless networks. Such antennas can improve the quality of individual links and decrease overall interference. However, the interaction of environmental effects with signal directionality is not well understood. We observe that state of the art simulators make simplifying assumptions which are often unrealistic and can give a misleading picture of application layer performance. Because simulators are often used for prototyping and validating new ideas, their realism and accuracy are of primary importance. In this paper, we apply a new empirical simulation method for directional antennas and study how well this models reality. We show that not only is our model easy to implement, but is also more accurate and thus better able to predict the performance of propagation-sensitive applications.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129444667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Natural selection of message forwarding algorithms in Multihop wireless networks 多跳无线网络中消息转发算法的自然选择
V. Simon, M. Bérces, E. Varga, L. Bacsardi
The need for self-managing Multihop MANETs (Mobile Ad Hoc Networks) arose recently, where the network rapidly adapts to the changes of the environment without any central control. One of the challenges is how to spread the information fast and resource-effectively in the network. This paper presents a novel adaptive framework, which utilizes natural selection for choosing the adequate message forwarding algorithms for changing environments. The survival of the competing algorithms depends on their efficiency, while the fitness evaluation is made locally without overhead generating performance feedback. Performance evaluations were carried out in our simulation platform tailored to a self-managing MANET environment, to analyze the performance measures of different message forwarding algorithms.
自管理多跳移动自组织网络(Multihop manet, Mobile Ad Hoc network)是一种无需中央控制就能快速适应环境变化的网络。如何在网络中快速有效地传播信息是一个挑战。本文提出了一种新的自适应框架,利用自然选择来选择适合变化环境的消息转发算法。竞争算法的生存取决于它们的效率,而适应度评估是在局部进行的,没有开销产生性能反馈。性能评估是在我们为自管理MANET环境量身定制的仿真平台上进行的,以分析不同消息转发算法的性能指标。
{"title":"Natural selection of message forwarding algorithms in Multihop wireless networks","authors":"V. Simon, M. Bérces, E. Varga, L. Bacsardi","doi":"10.1109/WIOPT.2009.5291633","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291633","url":null,"abstract":"The need for self-managing Multihop MANETs (Mobile Ad Hoc Networks) arose recently, where the network rapidly adapts to the changes of the environment without any central control. One of the challenges is how to spread the information fast and resource-effectively in the network. This paper presents a novel adaptive framework, which utilizes natural selection for choosing the adequate message forwarding algorithms for changing environments. The survival of the competing algorithms depends on their efficiency, while the fitness evaluation is made locally without overhead generating performance feedback. Performance evaluations were carried out in our simulation platform tailored to a self-managing MANET environment, to analyze the performance measures of different message forwarding algorithms.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130245789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A graph theoretic approach for optimizing key pre-distribution in wireless sensor networks 无线传感器网络中密钥预分配优化的图论方法
A. C. Chan
Finding an optimal key assignment (subject to given constraints) for a key predistribution scheme in wireless sensor networks is a difficult task. Hence, most of the practical schemes are based on probabilistic key assignment, which leads to sub-optimal schemes requiring key storage linear in the total number of nodes. A graph theoretic framework is introduced to study the fundamental tradeoffs between key storage, average key path length (directly related to the battery consumption) and resilience (to compromised nodes) of key predistribution schemes for wireless sensor networks. Based on the proposed framework, a lower bound on key storage is derived for a given average key path length. An upper bound on the compromising probability is also given. This framework also leads to the design of key assignment schemes with a storage complexity of the same order as the lower bound.
在无线传感器网络中,为密钥预分配方案寻找一个最优的密钥分配(受给定约束)是一个困难的任务。因此,大多数实际方案都是基于概率密钥分配,这导致次优方案需要密钥存储在节点总数中呈线性。引入了一个图论框架来研究无线传感器网络密钥预分配方案的密钥存储、平均密钥路径长度(与电池消耗直接相关)和弹性(对受损节点)之间的基本权衡。基于所提出的框架,导出了给定平均密钥路径长度的密钥存储下界。给出了妥协概率的上界。该框架还导致设计具有与下界相同顺序的存储复杂度的密钥分配方案。
{"title":"A graph theoretic approach for optimizing key pre-distribution in wireless sensor networks","authors":"A. C. Chan","doi":"10.1109/WIOPT.2009.5291629","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291629","url":null,"abstract":"Finding an optimal key assignment (subject to given constraints) for a key predistribution scheme in wireless sensor networks is a difficult task. Hence, most of the practical schemes are based on probabilistic key assignment, which leads to sub-optimal schemes requiring key storage linear in the total number of nodes. A graph theoretic framework is introduced to study the fundamental tradeoffs between key storage, average key path length (directly related to the battery consumption) and resilience (to compromised nodes) of key predistribution schemes for wireless sensor networks. Based on the proposed framework, a lower bound on key storage is derived for a given average key path length. An upper bound on the compromising probability is also given. This framework also leads to the design of key assignment schemes with a storage complexity of the same order as the lower bound.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130651170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Protocol-level cooperation in wireless networks: Stable throughput and delay analysis 无线网络中的协议级合作:稳定吞吐量和延迟分析
B. Rong, A. Ephremides
We study the impact of user cooperation in wireless networks on improving the stable throughput and delay performance. Specifically, we consider a multiaccess system in which a set of source users generate packets to deliver to a common destination. A cooperation strategy is proposed at the protocol level, where users with a better channel to the destination have the option to relay packets from users that are farther afield. For the case of erasure channels with single-packet reception, we derive the stable throughput regions under different multiple access policies based on such cooperation strategy. Then we prove that the stable throughput region of the cooperative system strictly contains the stable throughput region achieved without cooperation. We also assess the delay performance, and show that cooperation significantly reduces the delay of all users. Finally, we characterize the effect of inter-user channel quality on performance, and show that the gain in performance through cooperation increases as the channel quality improves. Our work offers an innovative perspective by implementing cooperation at the network protocol level, while taking into consideration of fading and attenuation at the physical layer as well as the nature of traffic burstiness in a network.
研究了无线网络中用户协作对提高稳定吞吐量和延迟性能的影响。具体地说,我们考虑一个多址系统,在这个系统中,一组源用户生成数据包并传送到一个共同的目的地。在协议层提出了一种协作策略,其中具有较好到达目的地通道的用户可以选择中继来自较远用户的数据包。对于单包接收的擦除信道,我们基于这种协作策略导出了不同多址策略下的稳定吞吐量区域。然后证明了合作系统的稳定吞吐量区域严格包含了不合作的稳定吞吐量区域。我们还评估了延迟性能,并表明合作显着降低了所有用户的延迟。最后,我们描述了用户间信道质量对性能的影响,并表明通过合作获得的性能增益随着信道质量的提高而增加。我们的工作提供了一个创新的视角,通过在网络协议级别实现合作,同时考虑到物理层的衰落和衰减以及网络中流量突发的性质。
{"title":"Protocol-level cooperation in wireless networks: Stable throughput and delay analysis","authors":"B. Rong, A. Ephremides","doi":"10.1109/WIOPT.2009.5291617","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291617","url":null,"abstract":"We study the impact of user cooperation in wireless networks on improving the stable throughput and delay performance. Specifically, we consider a multiaccess system in which a set of source users generate packets to deliver to a common destination. A cooperation strategy is proposed at the protocol level, where users with a better channel to the destination have the option to relay packets from users that are farther afield. For the case of erasure channels with single-packet reception, we derive the stable throughput regions under different multiple access policies based on such cooperation strategy. Then we prove that the stable throughput region of the cooperative system strictly contains the stable throughput region achieved without cooperation. We also assess the delay performance, and show that cooperation significantly reduces the delay of all users. Finally, we characterize the effect of inter-user channel quality on performance, and show that the gain in performance through cooperation increases as the channel quality improves. Our work offers an innovative perspective by implementing cooperation at the network protocol level, while taking into consideration of fading and attenuation at the physical layer as well as the nature of traffic burstiness in a network.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122473821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Adaptive multi-pattern reuse in multi-cell networks 多小区网络中的自适应多模式复用
K. Son, Yung Yi, S. Chong
Achieving sufficient spatial capacity gain by having small cells requires careful treatment of inter-cell interference (ICI) management via BS power coordination coupled with user scheduling inside cells. Optimal algorithms have been known to be hard to implement due to high computation and signaling overheads. We propose joint pattern-based ICI management and user scheduling algorithms that are practically implementable. The basic idea is to decompose the original problem into two sub-problems, where we run ICI management at a slower time scale than user scheduling. We empirically show that even with such a slow tracking of system dynamics at the ICI management part, the decomposed approach achieves high performance increase, compared to a conventional universal reuse scheme.
通过使用小小区来获得足够的空间容量,需要仔细处理小区间干扰(ICI)管理,通过BS功率协调与小区内的用户调度相结合。众所周知,由于高计算和信令开销,优化算法难以实现。我们提出了基于联合模式的ICI管理和用户调度算法,这些算法是实际可实现的。基本思想是将原始问题分解为两个子问题,其中我们以比用户调度更慢的时间尺度运行ICI管理。我们的经验表明,即使在ICI管理部分的系统动态跟踪如此缓慢,与传统的通用重用方案相比,分解方法也实现了高性能的提高。
{"title":"Adaptive multi-pattern reuse in multi-cell networks","authors":"K. Son, Yung Yi, S. Chong","doi":"10.1109/WIOPT.2009.5291628","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291628","url":null,"abstract":"Achieving sufficient spatial capacity gain by having small cells requires careful treatment of inter-cell interference (ICI) management via BS power coordination coupled with user scheduling inside cells. Optimal algorithms have been known to be hard to implement due to high computation and signaling overheads. We propose joint pattern-based ICI management and user scheduling algorithms that are practically implementable. The basic idea is to decompose the original problem into two sub-problems, where we run ICI management at a slower time scale than user scheduling. We empirically show that even with such a slow tracking of system dynamics at the ICI management part, the decomposed approach achieves high performance increase, compared to a conventional universal reuse scheme.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122545031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A new collision-free pseudonym scheme in mobile ad hoc networks 移动自组织网络中一种新的无冲突假名方案
J. Yoon, Hyoungshick Kim
A mobile ad hoc network (MANET) is a decentralized network of mobile nodes. Due to the broadcast nature of radio transmissions, communication in MANETs is more susceptible to malicious traffic analysis. An interesting problem is how to thwart malicious traffic analysis. Most anonymous communication protocols are based on the pseudonyms of mobile nodes. However, conventional pseudonym schemes have some limitations such as collisions of pseudonyms and high computational complexity due to the use of cryptographic hash functions. Collisions of identities are not desirable since they are the main causes for reduced effective bandwidth, increased energy consumption and non-deterministic data delivery. In this paper, we propose a new collision-free pseudonym scheme to enable anonymous communication. In our approach, each node generates pseudonyms by using a permutation matrix without collisions. The challenging issue is how to store the overall permutation matrix. It is practically hard to assume that mobile nodes maintain the permutation matrix due to the limitation of resources. Therefore we design the online computation of each node's own pseudonym without loading the overall matrix.
移动自组网(MANET)是一个分散的移动节点网络。由于无线电传输的广播性质,manet中的通信更容易受到恶意流量分析的影响。一个有趣的问题是如何阻止恶意流量分析。大多数匿名通信协议都是基于移动节点的假名。然而,传统的假名方案由于使用加密散列函数而存在假名冲突和高计算复杂度等局限性。身份的冲突是不可取的,因为它们是减少有效带宽、增加能耗和不确定数据传输的主要原因。在本文中,我们提出了一种新的无冲突的假名方案来实现匿名通信。在我们的方法中,每个节点通过使用无冲突的排列矩阵来生成假名。具有挑战性的问题是如何存储整个排列矩阵。由于资源的限制,实际上很难假设移动节点维持排列矩阵。因此,我们设计了在线计算每个节点自己的假名,而不加载整个矩阵。
{"title":"A new collision-free pseudonym scheme in mobile ad hoc networks","authors":"J. Yoon, Hyoungshick Kim","doi":"10.1109/WIOPT.2009.5291612","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291612","url":null,"abstract":"A mobile ad hoc network (MANET) is a decentralized network of mobile nodes. Due to the broadcast nature of radio transmissions, communication in MANETs is more susceptible to malicious traffic analysis. An interesting problem is how to thwart malicious traffic analysis. Most anonymous communication protocols are based on the pseudonyms of mobile nodes. However, conventional pseudonym schemes have some limitations such as collisions of pseudonyms and high computational complexity due to the use of cryptographic hash functions. Collisions of identities are not desirable since they are the main causes for reduced effective bandwidth, increased energy consumption and non-deterministic data delivery. In this paper, we propose a new collision-free pseudonym scheme to enable anonymous communication. In our approach, each node generates pseudonyms by using a permutation matrix without collisions. The challenging issue is how to store the overall permutation matrix. It is practically hard to assume that mobile nodes maintain the permutation matrix due to the limitation of resources. Therefore we design the online computation of each node's own pseudonym without loading the overall matrix.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127323965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Feasibility of the receiver capacity model for multi-hop wireless networks 多跳无线网络接收机容量模型的可行性
A. Sridharan, B. Krishnamachari
The receiver capacity model is a simple model to capture flow dynamics in a multi-hop wireless network, by presenting linear constraints to define the feasible rate region of the network, taking into account interference. The model associates with each receiver in the network a notion of constant receiver capacity. Receiver capacity is defined as the maximum possible sum rate of all flows that the receiver can send, receive, and overhear. As has been shown in prior work by the authors, the linear constraints presented by this model make it particularly useful in approximating the true rate region, and designing distributed protocols for multi-hop wireless networks. It is well known that if we use only local constraints to define the rate region, the constraints have to be bounded by some fraction of the interference free link rate, in order to ensure that the rate satisfying these constraints can be feasibly scheduled in any graph. The key challenge in using this model is therefore to estimate the fraction of the link rate that the receiver capacity should be set to, in order to present a feasible rate vector. In this work we answer this question from a theoretical standpoint, and show that as long as the receiver capacity is set to ⅓ the interference free link rate, all rate vectors that satisfy the constraints of the receiver capacity model can be feasibly scheduled.
接收机容量模型是一种捕捉多跳无线网络中流量动态的简单模型,它在考虑干扰的情况下,通过线性约束来定义网络的可行速率区域。该模型与网络中的每个接收器关联一个恒定接收器容量的概念。接收方容量被定义为接收方可以发送、接收和监听的所有流的最大可能总和速率。正如作者在先前的工作中所显示的那样,该模型所提出的线性约束使得它在近似真实速率区域和设计多跳无线网络的分布式协议方面特别有用。众所周知,如果仅使用局部约束来定义速率区域,则约束必须以无干扰链路速率的某个分数为界,以确保满足这些约束的速率可以在任何图中可行地调度。因此,使用该模型的关键挑战是估计接收器容量应设置的链路速率的比例,以便呈现可行的速率向量。本文从理论角度回答了这一问题,并证明只要将接收机容量设置为无干扰链路速率的1 / 3,就可以调度满足接收机容量模型约束的所有速率向量。
{"title":"Feasibility of the receiver capacity model for multi-hop wireless networks","authors":"A. Sridharan, B. Krishnamachari","doi":"10.1109/WIOPT.2009.5291622","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291622","url":null,"abstract":"The receiver capacity model is a simple model to capture flow dynamics in a multi-hop wireless network, by presenting linear constraints to define the feasible rate region of the network, taking into account interference. The model associates with each receiver in the network a notion of constant receiver capacity. Receiver capacity is defined as the maximum possible sum rate of all flows that the receiver can send, receive, and overhear. As has been shown in prior work by the authors, the linear constraints presented by this model make it particularly useful in approximating the true rate region, and designing distributed protocols for multi-hop wireless networks. It is well known that if we use only local constraints to define the rate region, the constraints have to be bounded by some fraction of the interference free link rate, in order to ensure that the rate satisfying these constraints can be feasibly scheduled in any graph. The key challenge in using this model is therefore to estimate the fraction of the link rate that the receiver capacity should be set to, in order to present a feasible rate vector. In this work we answer this question from a theoretical standpoint, and show that as long as the receiver capacity is set to ⅓ the interference free link rate, all rate vectors that satisfy the constraints of the receiver capacity model can be feasibly scheduled.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126440113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Transmit beamforming and power allocation for downlink OFDMA systems 下行OFDMA系统的发射波束形成和功率分配
K. Hayashi, Takeshi Fujii, Megumi Kaneko, H. Sakai, Y. Okada
This paper considers a transmit beamforming and subcarrier power allocation method for orthogonal frequency division multiple access (OFDMA) systems. As the beamforming vector control criterion, we employ the maximization of so-called signal-to-leakage-plus-noise ratio (SLNR) at each base station, which enable us to obtain closed form beamforming vector by using only locally available information. We also discuss the local optimality of the SLNR based beamforming vector. As for the subcarrier power allocation, two different approaches are employed, namely, the equalization of signal-to-interference-plus-noise ratio (SINR) for subcarriers and the maximization of sum rate of subcarriers. Computer simulation results show the validity of the transmit beamforming and power allocation method with highlighting the difference between the two power allocation algorithms.
研究正交频分多址(OFDMA)系统的发射波束形成和子载波功率分配方法。作为波束形成矢量控制准则,我们在每个基站上采用最大信漏加噪声比(SLNR),使我们能够仅利用局部可用信息获得封闭形式的波束形成矢量。我们还讨论了基于单波nr的波束形成矢量的局部最优性。对于子载波功率分配,采用两种不同的方法,即均衡子载波的信噪比(SINR)和最大化子载波的和率。计算机仿真结果表明了发射波束形成和功率分配方法的有效性,并突出了两种功率分配算法的差异。
{"title":"Transmit beamforming and power allocation for downlink OFDMA systems","authors":"K. Hayashi, Takeshi Fujii, Megumi Kaneko, H. Sakai, Y. Okada","doi":"10.1109/WIOPT.2009.5291589","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291589","url":null,"abstract":"This paper considers a transmit beamforming and subcarrier power allocation method for orthogonal frequency division multiple access (OFDMA) systems. As the beamforming vector control criterion, we employ the maximization of so-called signal-to-leakage-plus-noise ratio (SLNR) at each base station, which enable us to obtain closed form beamforming vector by using only locally available information. We also discuss the local optimality of the SLNR based beamforming vector. As for the subcarrier power allocation, two different approaches are employed, namely, the equalization of signal-to-interference-plus-noise ratio (SINR) for subcarriers and the maximization of sum rate of subcarriers. Computer simulation results show the validity of the transmit beamforming and power allocation method with highlighting the difference between the two power allocation algorithms.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132798417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1