首页 > 最新文献

Digital Communications and Networks最新文献

英文 中文
Quality-of-service support in LTE-A systems with the DRX mechanism 采用DRX机制的LTE-A系统的服务质量支持
Pub Date : 2018-01-01 DOI: 10.1016/J.DCAN.2018.04.001
Cheng-Jie Tsai, Tsern-Huei Lee
{"title":"Quality-of-service support in LTE-A systems with the DRX mechanism","authors":"Cheng-Jie Tsai, Tsern-Huei Lee","doi":"10.1016/J.DCAN.2018.04.001","DOIUrl":"https://doi.org/10.1016/J.DCAN.2018.04.001","url":null,"abstract":"","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/J.DCAN.2018.04.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54170699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Low signaling overhead group-based power-control scheme for massive machine-type communications 大规模机器型通信的低信令开销分组功率控制方案
Pub Date : 2017-11-03 DOI: 10.1016/J.DCAN.2017.10.005
Zihuan Yang, Tsern-Huei Lee
{"title":"Low signaling overhead group-based power-control scheme for massive machine-type communications","authors":"Zihuan Yang, Tsern-Huei Lee","doi":"10.1016/J.DCAN.2017.10.005","DOIUrl":"https://doi.org/10.1016/J.DCAN.2017.10.005","url":null,"abstract":"","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/J.DCAN.2017.10.005","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44222313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MERLIN: A Synergetic Integration of MAC and Routing Protocol for Distributed Sensor Networks 分布式传感器网络中MAC和路由协议的协同集成
Pub Date : 2006-09-28 DOI: 10.1109/SAHCN.2006.288431
A. Ruzzelli, Gregory M. P. O'Hare, M. O'Grady, R. Tynan
Notoriously, energy-efficient MAC protocols cause high latency of packets. Such delays may well increase when a routing protocol is applied. Therefore, quantifying the end-to-end delay and energy consumption when low duty cycle MAC and routing protocols are jointly used, is of particular interest. In this paper, we present a comprehensive evaluation of the MERLIN (MAC and efficient routing integrated with support for localization) protocol. MERLIN integrates MAC and routing features into a single architecture. In contrast to many sensor network protocols, it employs a multicast upstream and multicast downstream approach to relaying packets to and from the gateway. Simultaneous reception and transmission errors are notified by using asynchronous burst ACK and negative burst ACK. A division of the network into timezones, together with an appropriate scheduling policy, enables the routing of packets to the closest gateway. An evaluation of MERLIN has been conducted through simulation, against both the SMAC and the ESR routing protocols,which is an improved version of the DSR algorithm. The results illustrate how both SMAC and ESR, jointly used in low duty cycle scenarios, can cause an impractical and very high end-to-end delays. MERLIN, as an integrated approach, notably reduces the latency, resulting in nodes that can operate in a very low duty cycle. Consequently, an extension of the operative lifetime of the sensor network is achieved.
众所周知,高能效的MAC协议会导致数据包的高延迟。当应用路由协议时,这种延迟很可能会增加。因此,当低占空比MAC和路由协议联合使用时,量化端到端延迟和能耗是特别有趣的。在本文中,我们提出了一个全面的评估梅林(MAC和高效路由集成与支持定位)协议。MERLIN将MAC和路由功能集成到一个架构中。与许多传感器网络协议相比,它采用组播上行和组播下行方法来中继数据包进出网关。同时接收和发送错误通过异步突发ACK和负突发ACK通知。将网络划分为时区,加上适当的调度策略,可以将数据包路由到最近的网关。MERLIN是DSR算法的改进版本,并通过仿真对SMAC和ESR路由协议进行了评估。结果表明,在低占空比场景中联合使用SMAC和ESR如何导致不切实际且非常高的端到端延迟。MERLIN作为一种集成方法,显著降低了延迟,从而使节点可以在非常低的占空比下运行。因此,延长了传感器网络的使用寿命。
{"title":"MERLIN: A Synergetic Integration of MAC and Routing Protocol for Distributed Sensor Networks","authors":"A. Ruzzelli, Gregory M. P. O'Hare, M. O'Grady, R. Tynan","doi":"10.1109/SAHCN.2006.288431","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288431","url":null,"abstract":"Notoriously, energy-efficient MAC protocols cause high latency of packets. Such delays may well increase when a routing protocol is applied. Therefore, quantifying the end-to-end delay and energy consumption when low duty cycle MAC and routing protocols are jointly used, is of particular interest. In this paper, we present a comprehensive evaluation of the MERLIN (MAC and efficient routing integrated with support for localization) protocol. MERLIN integrates MAC and routing features into a single architecture. In contrast to many sensor network protocols, it employs a multicast upstream and multicast downstream approach to relaying packets to and from the gateway. Simultaneous reception and transmission errors are notified by using asynchronous burst ACK and negative burst ACK. A division of the network into timezones, together with an appropriate scheduling policy, enables the routing of packets to the closest gateway. An evaluation of MERLIN has been conducted through simulation, against both the SMAC and the ESR routing protocols,which is an improved version of the DSR algorithm. The results illustrate how both SMAC and ESR, jointly used in low duty cycle scenarios, can cause an impractical and very high end-to-end delays. MERLIN, as an integrated approach, notably reduces the latency, resulting in nodes that can operate in a very low duty cycle. Consequently, an extension of the operative lifetime of the sensor network is achieved.","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"41 1","pages":"266-275"},"PeriodicalIF":0.0,"publicationDate":"2006-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77886817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Consistency Error Modeling-based Localization in Sensor Networks 基于一致性误差建模的传感器网络定位
Pub Date : 2006-09-25 DOI: 10.1109/SAHCN.2006.288440
Jessica Feng, M. Potkonjak
We have developed a new error modeling and optimization-based localization approach for sensor networks in presence of distance measurement noise. The approach is solely based on the concept of consistency. The error models are constructed using non-parametric statistical techniques; they do not only indicate the most likely error, but also provide the likelihood distribution of particular errors occurring. The models are evaluated using the learn-and-test techniques and serve as the objective functions for the task of localization. The localization problem is formulated as task of maximizing consistency between measurements and calculated distances. We evaluated the approach in (i) both GPS-based and GPS-less scenarios; (ii) 1-D, 2-D and 3-D spaces, on sets of acoustic ranging-based distance measurements recorded by deployed sensor networks. The experimental evaluation indicates that localization of only a few centimeters is consistently achieved when the average and median distance measurement errors are more than a meter, even when the nodes have only a few distance measurements. The relative performance in terms of location accuracy compare favorably with respect to several state-of-the-art localization approaches. Finally, several insightful observations about the required conditions for accurate localization are deduced by analyzing the experimental results
我们开发了一种新的误差建模和基于优化的定位方法,用于存在距离测量噪声的传感器网络。这种方法完全基于一致性的概念。采用非参数统计技术建立误差模型;它们不仅表明最可能发生的错误,而且还提供特定错误发生的可能性分布。使用学习-测试技术对模型进行评估,并作为定位任务的目标函数。定位问题被表述为最大化测量值和计算距离之间的一致性的任务。我们在(i)基于gps和无gps两种情况下评估了该方法;(ii) 1-D, 2-D和3-D空间,基于部署的传感器网络记录的基于声学测距的距离测量集。实验评估表明,当平均距离测量误差和中位数距离测量误差大于1米时,即使节点只有很少的距离测量,也能始终实现仅几厘米的定位。在定位精度方面的相对性能优于几种最先进的定位方法。最后,通过对实验结果的分析,得出了精确定位所需条件的几点见解
{"title":"Consistency Error Modeling-based Localization in Sensor Networks","authors":"Jessica Feng, M. Potkonjak","doi":"10.1109/SAHCN.2006.288440","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288440","url":null,"abstract":"We have developed a new error modeling and optimization-based localization approach for sensor networks in presence of distance measurement noise. The approach is solely based on the concept of consistency. The error models are constructed using non-parametric statistical techniques; they do not only indicate the most likely error, but also provide the likelihood distribution of particular errors occurring. The models are evaluated using the learn-and-test techniques and serve as the objective functions for the task of localization. The localization problem is formulated as task of maximizing consistency between measurements and calculated distances. We evaluated the approach in (i) both GPS-based and GPS-less scenarios; (ii) 1-D, 2-D and 3-D spaces, on sets of acoustic ranging-based distance measurements recorded by deployed sensor networks. The experimental evaluation indicates that localization of only a few centimeters is consistently achieved when the average and median distance measurement errors are more than a meter, even when the nodes have only a few distance measurements. The relative performance in terms of location accuracy compare favorably with respect to several state-of-the-art localization approaches. Finally, several insightful observations about the required conditions for accurate localization are deduced by analyzing the experimental results","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"50 1","pages":"356-364"},"PeriodicalIF":0.0,"publicationDate":"2006-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76630221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modeling the Effect of BEB for a Hidden Terminal Topology from a New Perspective 从新的角度建模隐终端拓扑的BEB效应
Pub Date : 2006-09-01 DOI: 10.1109/SAHCN.2006.288519
A. Tsertou, D. Laurenson
The last couple of years were characterised by the revival of interest in the performance evaluation of wireless multihop networks. An issue of great significance in carrier-sense based multihop networks is the hidden node problem. In our recent work we showed that previous techniques are suitable for limited node configurations and we proposed a novel time model that relaxes most assumptions in the literature and exhibits high accuracy of performance evaluation. The present paper extends our recent work, which was based on a constant contention window assumption, to the binary exponential backoff (BEB) mechanism of IEEE 802.11, with an equally high degree of agreement to simulation results. Key points of our analysis are the consideration of different collision probabilities, dependent on the backoff stage, and the use of a discrete time Markov chain embedded in the channel state evolution that allows us to compute the 'backoff-dwelling' distribution of each transmitter
过去几年的特点是对无线多跳网络性能评估的兴趣重新燃起。隐节点问题是基于载波感知的多跳网络中一个非常重要的问题。在我们最近的工作中,我们证明了以前的技术适用于有限的节点配置,我们提出了一种新的时间模型,该模型放宽了文献中的大多数假设,并表现出较高的性能评估准确性。本文将我们最近基于恒定竞争窗口假设的工作扩展到IEEE 802.11的二进制指数回退(BEB)机制,与仿真结果具有同样高的一致性。我们分析的关键点是考虑不同的碰撞概率,取决于后退阶段,以及使用嵌入在信道状态演变中的离散时间马尔可夫链,使我们能够计算每个发射机的“后退”分布
{"title":"Modeling the Effect of BEB for a Hidden Terminal Topology from a New Perspective","authors":"A. Tsertou, D. Laurenson","doi":"10.1109/SAHCN.2006.288519","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288519","url":null,"abstract":"The last couple of years were characterised by the revival of interest in the performance evaluation of wireless multihop networks. An issue of great significance in carrier-sense based multihop networks is the hidden node problem. In our recent work we showed that previous techniques are suitable for limited node configurations and we proposed a novel time model that relaxes most assumptions in the literature and exhibits high accuracy of performance evaluation. The present paper extends our recent work, which was based on a constant contention window assumption, to the binary exponential backoff (BEB) mechanism of IEEE 802.11, with an equally high degree of agreement to simulation results. Key points of our analysis are the consideration of different collision probabilities, dependent on the backoff stage, and the use of a discrete time Markov chain embedded in the channel state evolution that allows us to compute the 'backoff-dwelling' distribution of each transmitter","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"2 1","pages":"607-614"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81918464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Capacity Evaluation Framework and Validation of Self-Organized Routing Schemes 自组织路由方案的容量评估框架与验证
Pub Date : 2006-06-28 DOI: 10.1109/SAHCN.2006.288560
H. Rivano, Fabrice Théoleyre, F. Valois
Assuming a given network topology and a routing protocol, this work is focused on the capacity evaluation of routing protocols based on either a self-organization scheme or a flat approach. To reach this goal, we propose to use linear-programming formulation to model radio resource sharing as linear constraints. Four models are detailed to evaluate the capacity of any routing scheme in wireless multihops networks. First, two models of fairness are proposed: either each node has a fair access to the channel, or the fairness is among the radio links. Besides, a pessimistic and an optimistic scenarios of spatial re-utilization of the medium are proposed, yielding a lower bound and an upper bound on the network capacity for each fairness case. Finally, using this model, we provide a comparative analysis of some flat and self-organized routing protocols
假设给定网络拓扑结构和路由协议,本工作的重点是基于自组织方案或平面方法的路由协议的容量评估。为了达到这一目标,我们建议使用线性规划公式将无线电资源共享建模为线性约束。详细介绍了四种模型来评估无线多跳网络中任何路由方案的容量。首先,提出了两种公平模型:每个节点都有一个公平的信道访问,或者是无线电链路之间的公平。在此基础上,提出了网络空间复用的悲观和乐观两种情形,并给出了网络容量的上界和下界。最后,利用该模型对平面路由协议和自组织路由协议进行了比较分析
{"title":"Capacity Evaluation Framework and Validation of Self-Organized Routing Schemes","authors":"H. Rivano, Fabrice Théoleyre, F. Valois","doi":"10.1109/SAHCN.2006.288560","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288560","url":null,"abstract":"Assuming a given network topology and a routing protocol, this work is focused on the capacity evaluation of routing protocols based on either a self-organization scheme or a flat approach. To reach this goal, we propose to use linear-programming formulation to model radio resource sharing as linear constraints. Four models are detailed to evaluate the capacity of any routing scheme in wireless multihops networks. First, two models of fairness are proposed: either each node has a fair access to the channel, or the fairness is among the radio links. Besides, a pessimistic and an optimistic scenarios of spatial re-utilization of the medium are proposed, yielding a lower bound and an upper bound on the network capacity for each fairness case. Finally, using this model, we provide a comparative analysis of some flat and self-organized routing protocols","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"12 1","pages":"779-785"},"PeriodicalIF":0.0,"publicationDate":"2006-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78657899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
1-hopMAC: An Energy-Efficient MAC Protocol for Avoiding 1 -hop Neighborhood Knowledge 1- hopmac:一种避免1跳邻居知识的节能MAC协议
Pub Date : 2006-05-01 DOI: 10.1109/SAHCN.2006.288524
T. Watteyne, A. Bachir, M. Dohler, D. Barthel, I. Augé-Blum
Wireless sensor networks (WSNs) have witnessed a tremendous upsurge in recent years, both in academia and industry; this is mainly attributed to their unprecedented operating conditions and a variety of commercially viable applications. Because of their dependence on scarce battery power, communication protocols need to be energy efficient. However, finding the optimal solution is challenging as it needs to consider the whole communication stack at once. In this paper, we propose an approach that aims at optimizing jointly L2 (link) and L3 (routing) protocols. We design 1-hopMAC, a communication architecture grouping MAC and routing layers which avoids 1-hop neighborhood knowledge. 1-hopMAC can be combined, among others, with a geographic or gradient based routing protocols. We present an analytical study of energy consumption to point out the optimal configuration of 1-hopMAC
近年来,无线传感器网络(WSNs)在学术界和工业界都得到了极大的发展;这主要归功于它们前所未有的操作条件和各种商业上可行的应用。由于它们依赖于稀缺的电池电力,通信协议需要节能。然而,找到最优解决方案是具有挑战性的,因为它需要同时考虑整个通信堆栈。在本文中,我们提出了一种旨在联合优化L2(链路)和L3(路由)协议的方法。我们设计了1-hopMAC,这是一种将MAC和路由层分组的通信体系结构,避免了1跳邻居知识。1-hopMAC可以与其他基于地理或梯度的路由协议相结合。通过对能耗的分析研究,指出了1-hopMAC的最优配置
{"title":"1-hopMAC: An Energy-Efficient MAC Protocol for Avoiding 1 -hop Neighborhood Knowledge","authors":"T. Watteyne, A. Bachir, M. Dohler, D. Barthel, I. Augé-Blum","doi":"10.1109/SAHCN.2006.288524","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288524","url":null,"abstract":"Wireless sensor networks (WSNs) have witnessed a tremendous upsurge in recent years, both in academia and industry; this is mainly attributed to their unprecedented operating conditions and a variety of commercially viable applications. Because of their dependence on scarce battery power, communication protocols need to be energy efficient. However, finding the optimal solution is challenging as it needs to consider the whole communication stack at once. In this paper, we propose an approach that aims at optimizing jointly L2 (link) and L3 (routing) protocols. We design 1-hopMAC, a communication architecture grouping MAC and routing layers which avoids 1-hop neighborhood knowledge. 1-hopMAC can be combined, among others, with a geographic or gradient based routing protocols. We present an analytical study of energy consumption to point out the optimal configuration of 1-hopMAC","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"233 1","pages":"639-644"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75768192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
An Anonymous Routing Protocol with The Local-repair Mechanism for Mobile Ad Hoc Networks 一种具有本地修复机制的移动Ad Hoc网络匿名路由协议
Pub Date : 2006-01-01 DOI: 10.1109/SAHCN.2006.288411
Bo Zhu, S. Jajodia, M. Kankanhalli, F. Bao, R. Deng
In this paper, we first define the requirements on anonymity and security properties of the routing protocol in mobile ad hoc networks, and then propose a new anonymous routing protocol with the local-repair mechanism. Detailed analysis shows that our protocol achieves both anonymity and security properties defined. A major challenge in designing anonymous routing protocols is to reduce computation and communication costs. To overcome this challenge, our protocol is design to require neither asymmetric nor symmetric encryption/decryption while updating the flooding route requests; more importantly, once a route is broken, instead of re-launching a new costly flooding route discovery process like previous work, our protocol provides a local-repair mechanism to fix broken parts of a route without compromising anonymity
本文首先定义了移动自组织网络中路由协议的匿名性和安全性要求,在此基础上提出了一种新的具有本地修复机制的匿名路由协议。详细分析表明,我们的协议实现了定义的匿名性和安全性。设计匿名路由协议的一个主要挑战是减少计算和通信成本。为了克服这一挑战,我们的协议设计为在更新洪水路由请求时既不需要非对称也不需要对称加密/解密;更重要的是,一旦路由被破坏,我们的协议提供了一个局部修复机制,在不影响匿名性的情况下修复路由的损坏部分,而不是像以前的工作那样重新启动一个新的昂贵的洪水路由发现过程
{"title":"An Anonymous Routing Protocol with The Local-repair Mechanism for Mobile Ad Hoc Networks","authors":"Bo Zhu, S. Jajodia, M. Kankanhalli, F. Bao, R. Deng","doi":"10.1109/SAHCN.2006.288411","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288411","url":null,"abstract":"In this paper, we first define the requirements on anonymity and security properties of the routing protocol in mobile ad hoc networks, and then propose a new anonymous routing protocol with the local-repair mechanism. Detailed analysis shows that our protocol achieves both anonymity and security properties defined. A major challenge in designing anonymous routing protocols is to reduce computation and communication costs. To overcome this challenge, our protocol is design to require neither asymmetric nor symmetric encryption/decryption while updating the flooding route requests; more importantly, once a route is broken, instead of re-launching a new costly flooding route discovery process like previous work, our protocol provides a local-repair mechanism to fix broken parts of a route without compromising anonymity","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"8 1","pages":"70-79"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73441082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance Evaluation of Secure on-Demand Routing Protocols for Mobile Ad-hoc Networks 移动Ad-hoc网络安全按需路由协议的性能评估
Pub Date : 2006-01-01 DOI: 10.1109/SAHCN.2006.288591
J. Arshad, M. A. Azad
With the passage of time and increase in the need for mobility wireless or mobile networks emerged to replace the wired networks. This new generation of networks is different from the earlier one in many aspects like network infrastructure, resources and routing protocols, routing devices etc. These networks are bandwidth and resource constrained with no network infrastructure and dedicated routing devices. Moreover, every node in such networks has to take care of its routing module itself. These characteristics become reasons for the importance of security in mobile ad-hoc networks as there is very high probability of attacks in such networks. Some work has been done to compare different protocols on basis of security but keeping in view the resource limitations in such networks, evaluation based on networking context is also important. We evaluate the overall performance overhead associated with secure routing protocols for mobile ad-hoc networks (MANETs). We implement the secure ad-hoc on-demand distance vector routing protocol (SAODV) extensions with AODV in the network simulator 2 (NS-2) and use the Monarch project implementation of Ariadne for our evaluation purpose. We try to figure out the amount of extra work a mobile node has to do in order to operate securely
随着时间的推移和移动需求的增加,无线或移动网络应运而生,以取代有线网络。新一代网络在网络基础设施、网络资源、路由协议、路由设备等方面与上一代网络有很大的不同。这些网络带宽和资源有限,没有网络基础设施和专用路由设备。此外,这种网络中的每个节点都必须自己负责路由模块。这些特点使得移动自组网的安全性变得非常重要,因为在这种网络中攻击的概率非常高。已经做了一些工作来比较基于安全性的不同协议,但考虑到此类网络中的资源限制,基于网络环境的评估也很重要。我们评估了与移动自组织网络(manet)的安全路由协议相关的总体性能开销。我们在网络模拟器2 (NS-2)中使用AODV实现了安全的ad-hoc按需距离矢量路由协议(SAODV)扩展,并使用Ariadne的君主项目实现来进行评估。我们试图计算出移动节点为了安全运行而必须做的额外工作量
{"title":"Performance Evaluation of Secure on-Demand Routing Protocols for Mobile Ad-hoc Networks","authors":"J. Arshad, M. A. Azad","doi":"10.1109/SAHCN.2006.288591","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288591","url":null,"abstract":"With the passage of time and increase in the need for mobility wireless or mobile networks emerged to replace the wired networks. This new generation of networks is different from the earlier one in many aspects like network infrastructure, resources and routing protocols, routing devices etc. These networks are bandwidth and resource constrained with no network infrastructure and dedicated routing devices. Moreover, every node in such networks has to take care of its routing module itself. These characteristics become reasons for the importance of security in mobile ad-hoc networks as there is very high probability of attacks in such networks. Some work has been done to compare different protocols on basis of security but keeping in view the resource limitations in such networks, evaluation based on networking context is also important. We evaluate the overall performance overhead associated with secure routing protocols for mobile ad-hoc networks (MANETs). We implement the secure ad-hoc on-demand distance vector routing protocol (SAODV) extensions with AODV in the network simulator 2 (NS-2) and use the Monarch project implementation of Ariadne for our evaluation purpose. We try to figure out the amount of extra work a mobile node has to do in order to operate securely","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"27 1","pages":"971-975"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73449031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
A spatio-temporal model for physical carrier sensing wireless ad-hoc networks 物理载波传感无线自组网的时空模型
Pub Date : 2006-01-01 DOI: 10.1109/SAHCN.2006.288432
E. Wong, R. Cruz
In this paper, we propose a simple analytic model for a physical carrier sensing wireless ad-hoc network. Attempted packet transmissions are modeled as a three dimensional Poisson point process in space and time. Each node measures the total interference power before an attempted transmission, and proceeds with the transmission only if the total interference power is below a threshold, called the idle threshold. A completed transmission is successfully received if the interference power at the intended destination is suitably low during the transmission. The total interference process is modeled as a shot noise that is a filtered in space and time, which accounts for an infinite number of concurrent transmissions on the infinite plane. We make a Gaussian approximation for the power of the interference process. A key mechanism for physical carrier sensing we take into account in our model is the inhibitory effect of nearby neighbors around an existing transmission. The inhibiting model is based on the threshold on the interference level rather than a geographically defined region. We model this effect using the conditional intensity of transmissions given an existing transmission, which can be solved using a system of two fixed point equations. We further approximate the conditional statistics of transmissions as Poisson to obtain a simpler model. We compare the predictions using the simpler model to Monte Carlo simulations results based on the model without the Poisson approximation, and we find a reasonably close match. Our results suggest the simpler model can be used as a guide to set the protocol parameters such as transmission attempts intensity, distance between the transmitter and its intended receiver, transmission power, packet duration, idle and packet detection threshold, in order to optimize network throughput
在本文中,我们提出了一个简单的物理载波传感无线自组网的分析模型。尝试包传输被建模为空间和时间上的三维泊松点过程。每个节点在尝试传输之前测量总干扰功率,只有当总干扰功率低于一个阈值(称为空闲阈值)时才继续传输。如果在传输过程中预期目的地的干扰功率适当低,则成功接收完成的传输。总干涉过程被建模为一个在空间和时间上被过滤的散粒噪声,它在无限平面上有无限数量的并发传输。我们对干涉过程的功率作高斯近似。我们在模型中考虑的物理载波传感的一个关键机制是现有传输附近邻居的抑制效应。抑制模型是基于干扰水平的阈值,而不是地理上定义的区域。我们使用给定一个现有传输的条件传输强度来模拟这种效应,它可以用两个不动点方程的系统来求解。我们进一步将传输的条件统计量近似为泊松,得到一个更简单的模型。我们将使用简单模型的预测结果与基于没有泊松近似的模型的蒙特卡罗模拟结果进行了比较,我们发现了一个相当接近的匹配。我们的研究结果表明,更简单的模型可以作为设置协议参数的指导,如传输尝试强度、发送方与预期接收方之间的距离、传输功率、数据包持续时间、空闲和数据包检测阈值,以优化网络吞吐量
{"title":"A spatio-temporal model for physical carrier sensing wireless ad-hoc networks","authors":"E. Wong, R. Cruz","doi":"10.1109/SAHCN.2006.288432","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288432","url":null,"abstract":"In this paper, we propose a simple analytic model for a physical carrier sensing wireless ad-hoc network. Attempted packet transmissions are modeled as a three dimensional Poisson point process in space and time. Each node measures the total interference power before an attempted transmission, and proceeds with the transmission only if the total interference power is below a threshold, called the idle threshold. A completed transmission is successfully received if the interference power at the intended destination is suitably low during the transmission. The total interference process is modeled as a shot noise that is a filtered in space and time, which accounts for an infinite number of concurrent transmissions on the infinite plane. We make a Gaussian approximation for the power of the interference process. A key mechanism for physical carrier sensing we take into account in our model is the inhibitory effect of nearby neighbors around an existing transmission. The inhibiting model is based on the threshold on the interference level rather than a geographically defined region. We model this effect using the conditional intensity of transmissions given an existing transmission, which can be solved using a system of two fixed point equations. We further approximate the conditional statistics of transmissions as Poisson to obtain a simpler model. We compare the predictions using the simpler model to Monte Carlo simulations results based on the model without the Poisson approximation, and we find a reasonably close match. Our results suggest the simpler model can be used as a guide to set the protocol parameters such as transmission attempts intensity, distance between the transmitter and its intended receiver, transmission power, packet duration, idle and packet detection threshold, in order to optimize network throughput","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"16 1","pages":"276-285"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73730396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
Digital Communications and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1