首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
The proliferation of the wireless network over the last decade is one of the significant drivers for the increased deployment of mobile ad hoc networks (MANETs) in the battle field. It is not practically possible to build a fixed wired network infrastructure in battle field. But it is possible to create a mobile wireless network infrastructure because of the mobility of the soldiers. MANET is justified by the possibility of building a network where no infrastructure exists. MANET with group communication applications and multicasting can highly benefit from a networking environment such as military and emergency uses. In such applications, the used ad hoc networks need to be reliable and secure. In recent years, a specific technique called the universal generating function technique (UGFT) has been applied to determine the network reliability. The UGFT is based on an approach that is closely connected to generating functions that are widely used in probability theory. This work devotes to assess the MANET reliability using the UGFT. Reliability of the MANET is defined as the probability that the transformed message from the source can be passed successfully through the MANET and reached the target without any delay. Two kinds of UGFs are discussed in this work, and an algorithm has been proposed to execute the system reliability. This UGFT is illustrated with a case study in a battlefield environment. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

2.
Abstract

Parallel computing is a common technique for reducing execution time in distributed systems. An application is divided into several subtasks that can be executed simultaneously on a set of computers. Numerous parallel computing protocols and experiments have been measured on wired network environments, but little attention has been devoted to wireless networks. Wireless environments own characteristics that are unusual in wired networks, such as limited bandwidth, frequent disconnection, low power, and mobility. Due to the unique characteristics, the performance of parallel computing in wireless networks is degraded. This paper implements an adaptive transmission mechanism to cope with network contention and frequent disconnection. Experimental results show that the mechanism reduced total execution time effectively.  相似文献   

3.
Wireless Sensor Networks (WSNs) are an integral part of the Internet of Things (IoT) and are widely used in a plethora of applications. Typically, sensor networks operate in harsh environments where human intervention is often restricted, which makes battery replacement for sensor nodes impractical. Node failure due to battery drainage or harsh environmental conditions poses serious challenges to the connectivity of the network. Without a connectivity restoration mechanism, node failures ultimately lead to a network partition, which affects the basic function of the sensor network. Therefore, the research community actively concentrates on addressing and solving the challenges associated with connectivity restoration in sensor networks. Since energy is a scarce resource in sensor networks, it becomes the focus of research, and researchers strive to propose new solutions that are energy efficient. The common issue that is well studied and considered is how to increase the network’s life span by solving the node failure problem and achieving efficient energy utilization. This paper introduces a Cluster-based Node Recovery (CNR) connectivity restoration mechanism based on the concept of clustering. Clustering is a well-known mechanism in sensor networks, and it is known for its energy-efficient operation and scalability. The proposed technique utilizes a distributed cluster-based approach to identify the failed nodes, while Cluster Heads (CHs) play a significant role in the restoration of connectivity. Extensive simulations were conducted to evaluate the performance of the proposed technique and compare it with the existing techniques. The simulation results show that the proposed technique efficiently addresses node failure and restores connectivity by moving fewer nodes than other existing connectivity restoration mechanisms. The proposed mechanism also yields an improved field coverage as well as a lesser number of packets exchanged as compared to existing state-of-the-art mechanisms.  相似文献   

4.
Awdeh  R.Y. 《Communications, IET》2007,1(6):1187-1194
Previous work has shown that TCP (transmission control protocol) Vegas outperforms the more widely deployed TCP Reno in both wired and wireless networks. It was also shown that when both TCP variants coexist on the same wired links, Reno dominates because of its more aggressive behaviour. This paper examines for the first time the compatibility between Reno and Vegas in wireless IEEE 802.11 ad hoc networks. It is shown that Vegas generally dominates in the heterogeneous Reno/Vegas network scenario; a startling result that is inconsistent with what is seen in wired networks. It is shown that the wireless ad hoc network environment does not reward the aggressive behaviour of Reno. On the other hand, Vegas, with its more accurate yet more conservative mechanisms, is able to capture most of the bandwidth. This is found to be true when using the on-demand routing protocols of dynamic source routing (DSR) or ad hoc on-demand distance vector (AODV): the failure of a node to reach a next-hop node because of media access control (MAC)-sublayer repeated collisions is reported to the routing protocol, which then declares a route error that impacts Reno in a more serious way than Vegas. When the table-driven routing protocol destination-sequenced distance vector (DSDV) is used, Reno and Vegas share the network bandwidth in a fairer manner. Generally, fairness in this environment can be improved by reducing the TCP maximum window size.  相似文献   

5.
Given the accelerating development of Internet of things (IoT), a secure and robust authentication mechanism is urgently required as a critical architectural component. The IoT has improved the quality of everyday life for numerous people in many ways. Owing to the predominantly wireless nature of the IoT, connected devices are more vulnerable to security threats compared to wired networks. User authentication is thus of utmost importance in terms of security on the IoT. Several authentication protocols have been proposed in recent years, but most prior schemes do not provide sufficient security for these wireless networks. To overcome the limitations of previous schemes, we propose an efficient and lightweight authentication scheme called the Cogent Biometric-Based Authentication Scheme (COBBAS). The proposed scheme is based on biometric data, and uses lightweight operations to enhance the efficiency of the network in terms of time, storage, and battery consumption. A formal security analysis of COBBAS using Burrows–Abadi–Needham logic proves that the proposed protocol provides secure mutual authentication. Formal security verification using the Automated Validation of Internet Security Protocols and Applications tool shows that the proposed protocol is safe against man-in-the-middle and replay attacks. Informal security analysis further shows that COBBAS protects wireless sensor networks against several security attacks such as password guessing, impersonation, stolen verifier attacks, denial-of-service attacks, and errors in biometric recognition. This protocol also provides user anonymity, confidentiality, integrity, and biometric recovery in acceptable time with reasonable computational cost.  相似文献   

6.
Model abstraction techniques have been widely used to accelerate simulations in the context of homogeneous wired networks. However, the application of these techniques to wireless networks is rare. The authors investigate how model abstraction techniques can be applied to simulations of mobile ad hoc networks (MANETS). The authors focus on the time-stepped (TS) simulation technique and its effect on simulation accuracy, analysing the simulation error introduced and providing a formal expression. This technique is implemented in a new simulator, session level simulator (SSIM), a TS session-level MANET simulator developed in the course of this research. The results of experiments conducted using SSIM show that the TS simulation can speedup MANET simulation and improve scalability by reducing the number of events and the simulation running time. Moreover, the study on simulation error illustrates that besides the length of the time step, parameters of mobility and traffic models also have great effect on simulation accuracy.  相似文献   

7.
Long-Term Evolution/Long-Term Evolution Advanced (LTE/LTE-A) is the latest mobile communication technology that is offering high data rates and robust performance to the subscribers. Since LTE/LTE-A standards are established on the Internet Protocol (IP) connectivity and provide compatibility with the heterogeneous networks, these new features create availability of the new security challenges in the LTE/LTE-A networks. Taking into consideration the issues of serious signalling congestion and security loopholes in LTE/LTE-A networks, the authors propose an Efficient Authentication and Key Agreement Protocol for Evolved Packet System (EAKA-EPS) with secure handover procedures. The proposed protocol achieves outstanding results in terms of the optimization of computation and signalling overhead. With this, the protocol guarantees the needed security requirements like protected wireless interface and strong mutual authentication between the entities, and ensures access stratum secrecy at the time of handovers. The formal verification results of the proposed scheme over the security verification and simulation tool “Automated Validation of Internet Security Protocols and Applications (AVISPA)” show that the suggested protocol is safe against various malicious attacks, which are still possible in LTE/LTE-A networks. To the best of the authors’ knowledge, the suggested approach is the first approach that provides perfect secrecy with less computation and communication overhead in the LTE/LTE-A networks.  相似文献   

8.
This report demonstrates a three-wire system for determining the physical sequence of addressable devices on a serial bus, enabling automated spatial mapping of sensors along a network. Small inductors between each chip are incorporated into an oscillator circuit, producing a different resonant frequency for each chip during the sequence detect function. Frequency-counting-based sequence detection is compatible with small microcontrollers such as those used in wireless environmental sensor networks. The sequence detection hardware does not interfere with normal use of the same three wires to supply power, data, and ground connections to the wired sensor network in this application.  相似文献   

9.
Broadcasting is a basic technique in Mobile ad-hoc network (MANET), and it refers to sending a packet from one node to every other node within the transmission range. Flooding is a type of broadcast where the received packet is retransmitted once by every node. The naive flooding technique, floods the network with query messages, while the random walk technique operates by contacting the subsets of every node’s neighbors at each step, thereby restricting the search space. One of the key challenges in an ad-hoc network is the resource or content discovery problem which is about locating the queried resource. Many earlier works have mainly focused on the simulation-based analysis of flooding, and its variants under a wired network. Although, there have been some empirical studies in peer-to-peer (P2P) networks, the analytical results are still lacking, especially in the context of P2P systems running over MANET. In this paper, we describe how P2P resource discovery protocols perform badly over MANETs. To address the limitations, we propose a new protocol named ABRW (Address Broadcast Random Walk), which is a lightweight search approach, designed considering the underlay topology aimed to better suit the unstructured architecture. We provide the mathematical model, measuring the performance of our proposed search scheme with different widely popular benchmarked search techniques. Further, we also derive three relevant search performance metrics, i.e., mean no. of steps needed to find a resource, the probability of finding a resource, and the mean no. of message overhead. We validated the analytical expressions through simulations. The simulation results closely matched with our analytical model, justifying our findings. Our proposed search algorithm under such highly dynamic self-evolving networks performed better, as it reduced the search latency, decreased the overall message overhead, and still equally had a good success rate.  相似文献   

10.
This paper seeks to provide an overview of achievements and caveats related to ICT strategies for development in Tunisia. We go beyond a conventional approach of digital divide by considering exclusion from or inequalities in access to high-speed wired broadband infrastructure as a significant explanative variable in this area. Accordingly, we link the roles of ICT as enablers of new opportunities for socio-economic growth to the development of the last mile of the wired broadband infrastructure. Our analysis of the Tunisian ICT environment shows a prevalence of mobile technologies for Internet access and telephony as well as regional and social disparities in availability, access to and use of wired broadband technologies and services. Despite the real interest of Tunisian society and economy in using Internet, the range of broadband enabled-services and applications is rather limited. Additionally, the Tunisian case provides a promising perspective as there is a relatively well developed fibre backbone and potentially good opportunity for developing the last mile of wired infrastructure. We therefore suggest that it is necessary to develop a governmental policy in collaboration with the private sector to further develop the last mile section as well as to overcome weaknesses in the current regulatory frameworks.  相似文献   

11.
Smart sensors have been recognized as a promising technology with the potential to overcome many of the inherent difficulties and limitations associated with traditional wired structural health monitoring (SHM) systems. The unique features offered by smart sensors, including wireless communication, on-board computation, and cost effectiveness, enable deployment of the dense array of sensors that are needed for monitoring of large-scale civil infrastructure. Despite the many advances in smart sensor technologies, power consumption is still considered as one of the most important challenges that should be addressed for the smart sensors to be more widely adopted in SHM applications. Data communication, the most significant source of the power consumption, can be reduced by appropriately selecting data processing schemes and the related network topology. This paper presents a new decentralized data aggregation approach for system identification based on the Random Decrement Technique (RDT). Following a brief overview of the RDT, which is an output-only system identification approach, a decentralized hierarchical approach is described and shown to be suitable for implementation in the intrinsically distributed computing environment found in wireless smart sensor networks (WSSNs). RDT-based decentralized data aggregation is then implemented on the Imote2 smart sensor platform based on the Illinois Structural Health Monitoring Project (ISHMP) Services Toolsuite. Finally, the efficacy of the RDT method is demonstrated experimentally in terms of the required data communication and the accuracy of identified dynamic properties.  相似文献   

12.
The authors propose a robust end-to-end loss differentiation scheme to identify the packet losses because of congestion for transport control protocol (TCP) connections over wired/wireless networks. The authors use the measured round trip time (RTT) values to determine whether the cause of packet loss is because of the congestion over wired path or regular bit errors over wireless paths. The classification should be as accurate as possible to achieve high throughput and maximum fairness for the TCP connections sharing the wired/wireless paths. The accuracies of previous schemes in the literature depends on varying network parameters such as RTT, buffer size, amount of cross traffic, wireless loss rate and congestion loss rate. The proposed scheme is robust in that the accuracy remains rather stable under varying network parameters. The basic idea behind the scheme is to set the threshold for the classification to be a function of the minimum RTT and the current sample RTT, so that it may automatically adapt itself to the current congestion level. When the congestion level of the path is estimated to be low, the threshold for a packet loss to be classified as a congestion loss is increased. This avoids unnecessary halving of the congestion window on packet loss because of the regular bit errors over the wireless path and hence improves the TCP throughput. When the congestion level of the path is estimated to be high, the threshold for a packet loss to be classified as the congestion loss not to miss any congestion loss is decreased and hence improves the TCP fairness. In ns 2 simulations, the proposed scheme correctly classifies the congestion losses under varying network parameters whereas the previous schemes show some dependency on subsets of parameters.  相似文献   

13.
Wireless sensor networks (WSNs) for structural health monitoring (SHM) applications can provide the data collection necessary for rapid structural assessment after an event such as a natural disaster puts the reliability of civil infrastructure in question. Technical challenges affecting deployment of such a network include ensuring power is maintained at the sensor nodes, reducing installation and maintenance costs, and automating the collection and analysis of data provided by a wireless sensor network. In this work, a new "mobile host" WSN paradigm is presented. This architecture utilizes nodes that are deployed without resident power. The associated sensors operate on a mechanical memory principle. A mobile host, such as a robot or unmanned aerial vehicle, is used on an as-needed basis to charge the node by wireless power delivery and subsequently retrieve the data by wireless interrogation. The mobile host may be guided in turn to any deployed node that requires interrogation. The contribution of this work is the first field demonstration of a mobile host wireless sensor network. The sensor node, referred to as THINNER, capable of collecting data wirelessly in the absence of electrical power was developed. A peak displacement sensor capable of interfacing with the THINNER sensor node was also designed and tested. A wireless energy delivery package capable of being carried by an airborne mobile host was developed. Finally, the system engineering required to implement the overall sensor network was carried out. The field demonstration took place on an out-of-service, full-scale bridge near Truth-or-Consequences, NM.  相似文献   

14.
Mobile Ad hoc Network (MANET) nodes exchange information using the multi-hop wireless communications without the need for any pre-existing infrastructure. Routing protocols of MANET are designed with an assumption that the nodes will cooperate in routing process. To achieve high throughput and reliable communication, the nodes are expected to cooperate with each other. Routing protocol plays a crucial role in an effective communication between nodes and operates on the assumption that the nodes are fully cooperative. Due to the open structure and limited battery-based energy in MANET, some nodes may not cooperate correctly or behave maliciously and such kind of misbehavior impacts the fairness, reliability and efficiency in MANET. Previous work addressed the ways to overcome these kinds of node misbehaviors and attacks. Most of the existing works need time to analyse the neighbor traffic and decide whether a neighbor is behaving maliciously or not. Further, the existing credit-based detection mechanisms may mark a genuine idle node as a malicious node. This work addresses a simple Neighbor Credit Value based AODV (NCV-AODV) routing algorithm for the detection of selfish behavior which avoids such false detection. The proposed idea is implemented in Ad hoc On Demand Distance Vector (AODV) routing protocol and an extensive analysis on the performance of the proposed detection mechanism against the selfish behavior of some MANET nodes are conducted.  相似文献   

15.
Human-centric sensing   总被引:1,自引:0,他引:1  
The first decade of the century witnessed a proliferation of devices with sensing and communication capabilities in the possession of the average individual. Examples range from camera phones and wireless global positioning system units to sensor-equipped, networked fitness devices and entertainment platforms (such as Wii). Social networking platforms emerged, such as Twitter, that allow sharing information in real time. The unprecedented deployment scale of such sensors and connectivity options ushers in an era of novel data-driven applications that rely on inputs collected by networks of humans or measured by sensors acting on their behalf. These applications will impact domains as diverse as health, transportation, energy, disaster recovery, intelligence and warfare. This paper surveys the important opportunities in human-centric sensing, identifies challenges brought about by such opportunities and describes emerging solutions to these challenges.  相似文献   

16.
A mobile ad hoc network (MANET) is a wireless, dynamic, infrastructure-less, self-organized, multi-hop, and decentralized network. Each node in MANET can act as a router as well as a work station. Many routing protocols have been developed to increase the efficiency of MANET. The primary objective of this paper is a detailed QoS comparison of reactive (AODV), proactive (DSDV), and hybrid (ZRP) routing protocols of MANET in order to find which routing protocol works best in a particular network scenario. The analysis was made for TCP-based traffic patterns. The performance differentials were analyzed on the basis of normalized routing overhead, packet loss, packet delivery ratio, control packets, end-to-end delay, packet received, and packet sent with a variation of nodes density and mobility. The results were obtained using the NS-2 simulator.  相似文献   

17.
Wireless sensor networks (WSNs) and Internet of Things (IoT) have gained more popularity in recent years as an underlying infrastructure for connected devices and sensors in smart cities. The data generated from these sensors are used by smart cities to strengthen their infrastructure, utilities, and public services. WSNs are suitable for long periods of data acquisition in smart cities. To make the networks of smart cities more reliable for sensitive information, the blockchain mechanism has been proposed. The key issues and challenges of WSNs in smart cities is efficiently scheduling the resources; leading to extending the network lifetime of sensors. In this paper, a linear network coding (LNC) for WSNs with blockchain-enabled IoT devices has been proposed. The consumption of energy is reduced for each node by applying LNC. The efficiency and the reliability of the proposed model are evaluated and compared to those of the existing models. Results from the simulation demonstrate that the proposed model increases the efficiency in terms of the number of live nodes, packet delivery ratio, throughput, and the optimized residual energy compared to other current techniques.  相似文献   

18.
The demand for mobile uplink traffic has increased significantly in the past few decades with the development of the Internet of Things (IoT) and mobile Internet. This has subsequently imposed challenges on 5G networks to provide high spectral efficiency and low-power massive connectivity. Non-orthogonal multiple access (NOMA) is a viable alternative to the current state-of-the-art orthogonal multiple access (OMA) techniques to address the challenges in 5G systems. In addition, a power control (PC) mechanism to mitigate the effect of interference between users can be accommodated to improve network performance. In this paper, we discuss the basic principles, key features, and strengths/weaknesses of the various power domain NOMA schemes. Moreover, we propose an uplink PC scheme for the users of a power domain NOMA network. The proposed PC method makes use of the evolutionary game theory (EGT) model to adaptively adjust the transmitted power level of the users which helps in mitigating user interference. A successive interference cancellation (SIC) receiver is applied at a base station (BS) in order to separate the users’ signals. By performing simulations, we show that the proposed EGT-based PC scheme achieves higher network efficiency, spectral efficiency, and energy efficiency.  相似文献   

19.
杨媛媛  季铁  张朵朵 《包装工程》2020,41(4):312-317
目的通过分析文化遗产在严肃游戏中应用的目的、玩法以及范围,探讨在面向未来的文化遗产教育中,严肃游戏可能发挥的潜力和方向。方法利用严肃游戏的G/P/S分类模型,进行国内外相关文献和案例的梳理,结合案例分析对文化遗产在严肃游戏中的应用现状、难点和趋势进行概述。结论文化遗产在严肃游戏中的设计与应用可以分为4个方向:文化展示和传播、文化意识和行为的改变、传统技艺的辅助性获取以及社会文化情景的构建。其游戏玩法和应用范围呈现出多样化、复杂化和跨界拓展的趋势。其中,将文化传承与其它教育目标相结合,在设计游戏时考虑学习者社会文化情景的构建是通过游戏学习文化遗产的一个新趋势。  相似文献   

20.
基于JAVA技术的工程图学网络习题系统的设计与实现   总被引:2,自引:2,他引:2  
以工程图学网络化教学为目的,针对目前各种工程图学网络习题系统的优势和不足,提出一种引入移动教育的系统构建方案。系统是以 JAVA 技术为开发手段,依据工程图学教学的特点而设计的网络习题系统。系统包括了运行于因特网上的有线部分和运行于无线网络上的无线部分,有文件上载、数据库和文件系统、图形平台等几大模块,能实现绘图,自动批改等多种功能,涉及到的技术包括无线上网技术,J2ME 无线应用等。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号