Other affiliations: Khalifa University, Beijing University of Posts and Telecommunications, Aarhus University ...read more
Bio: Eryk Dutkiewicz is an academic researcher from University of Technology, Sydney. The author has contributed to research in topics: Throughput & Computer science. The author has an hindex of 36, co-authored 441 publications receiving 5924 citations. Previous affiliations of Eryk Dutkiewicz include Khalifa University & Beijing University of Posts and Telecommunications.
Papers published on a yearly basis
••01 Jan 2004
TL;DR: In this article, a wide range of routing protocols have been proposed in the literature and a performance comparison of all routing protocols and suggest which protocols may perform best in large networks is provided.
Abstract: The 1990s have seen a rapid growth of research interests in mobile ad hoc networking. The infrastructureless and the dynamic nature of these networks demands new set of networking strategies to be implemented in order to provide efficient end-to-end communication. This, along with the diverse application of these networks in many different scenarios such as battlefield and disaster recovery, have seen MANETs being researched by many different organisations and institutes. MANETs employ the traditional TCP/IP structure to provide end-to-end communication between nodes. However, due to their mobility and the limited resource in wireless networks, each layer in the TCP/IP model require redefinition or modifications to function efficiently in MANETs. One interesting research area in MANET is routing. Routing in the MANETs is a challenging task and has received a tremendous amount of attention from researches. This has led to development of many different routing protocols for MANETs, and each author of each proposed protocol argues that the strategy proposed provides an improvement over a number of different strategies considered in the literature for a given network scenario. Therefore, it is quite difficult to determine which protocols may perform best under a number of different network scenarios, such as increasing node density and traffic. In this paper, we provide an overview of a wide range of routing protocols proposed in the literature. We also provide a performance comparison of all routing protocols and suggest which protocols may perform best in large networks.
TL;DR: Results show that the ratio between the block reward and the total network stake has a significant impact on the decentralization of the network, particularly in the field of Internet of Vehicles.
Abstract: The rapid development of blockchain technology and their numerous emerging applications has received huge attention in recent years. The distributed consensus mechanism is the backbone of a blockchain network. It plays a key role in ensuring the network’s security, integrity, and performance. Most current blockchain networks have been deploying the proof-of-work consensus mechanisms, in which the consensus is reached through intensive mining processes. However, this mechanism has several limitations, e.g., energy inefficiency, delay, and vulnerable to security threats. To overcome these problems, a new consensus mechanism has been developed recently, namely proof of stake, which enables to achieve the consensus via proving the stake ownership. This mechanism is expected to become a cutting-edge technology for future blockchain networks. This paper is dedicated to investigating proof-of-stake mechanisms, from fundamental knowledge to advanced proof-of-stake-based protocols along with performance analysis, e.g., energy consumption, delay, and security, as well as their promising applications, particularly in the field of Internet of Vehicles. The formation of stake pools and their effects on the network stake distribution are also analyzed and simulated. The results show that the ratio between the block reward and the total network stake has a significant impact on the decentralization of the network. Technical challenges and potential solutions are also discussed.
TL;DR: This paper evaluates the relevant PHY and MAC techniques for their ability to improve the reliability and reduce the latency and identifies that enabling long-term evolution to coexist in the unlicensed spectrum is also a potential enabler of URLLC in theUnlicensed band.
Abstract: Future 5th generation networks are expected to enable three key services—enhanced mobile broadband, massive machine type communications and ultra-reliable and low latency communications (URLLC). As per the 3rd generation partnership project URLLC requirements, it is expected that the reliability of one transmission of a 32 byte packet will be at least 99.999% and the latency will be at most 1 ms. This unprecedented level of reliability and latency will yield various new applications, such as smart grids, industrial automation and intelligent transport systems. In this survey we present potential future URLLC applications, and summarize the corresponding reliability and latency requirements. We provide a comprehensive discussion on physical (PHY) and medium access control (MAC) layer techniques that enable URLLC, addressing both licensed and unlicensed bands. This paper evaluates the relevant PHY and MAC techniques for their ability to improve the reliability and reduce the latency. We identify that enabling long-term evolution to coexist in the unlicensed spectrum is also a potential enabler of URLLC in the unlicensed band, and provide numerical evaluations. Lastly, this paper discusses the potential future research directions and challenges in achieving the URLLC requirements.
••28 Sep 2009
TL;DR: An energy efficient MAC protocol (BodyMAC) is proposed that uses flexible bandwidth allocation to improve node energy efficiency by reducing the possibility of packet collisions and by reducing radio transmission times, idle listening and control packets overhead.
Abstract: Wireless Body Area Networks (WBANs) enable placement of tiny biomedical sensors on or inside the human body to monitor vital body signs. The IEEE 802.15.6 task group is developing a standard to optimize WBAN performance by defining the physical layer (PHY) and media access control (MAC) layer specifications. In this paper an energy efficient MAC protocol (BodyMAC) is proposed. It uses flexible bandwidth allocation to improve node energy efficiency by reducing the possibility of packet collisions and by reducing radio transmission times, idle listening and control packets overhead. BodyMAC is based on a Downlink and Uplink scheme in which the Contention Free Part in the Uplink subframe is completely collision free. Three types of bandwidth allocation mechanisms allow for flexible and efficient data and control communications. An efficient Sleep Mode is introduced to reduce the idle listening duration, especially for low duty cycle nodes in the network. Simulation results show superior performance of BodyMAC compared to that of the IEEE 802.15.4 MAC.
TL;DR: This paper proposes a novel superior path planning mechanism called Z-curve that can successfully localize all deployed sensors with high precision and the shortest required time for localization, and considers an accurate and reliable channel model, which helps to provide more realistic evaluation.
Abstract: In many wireless sensor network applications, such as warning systems or healthcare services, it is necessary to update the captured data with location information. A promising solution for statically deployed sensors is to benefit from mobile beacon-assisted localization. The main challenge is to design and develop an optimum path planning mechanism for a mobile beacon to decrease the required time for determining location, increase the accuracy of the estimated position, and increase the coverage. In this paper, we propose a novel superior path planning mechanism called Z-curve. Our proposed trajectory can successfully localize all deployed sensors with high precision and the shortest required time for localization. We also introduce critical metrics, including the ineffective position rate for further evaluation of mobile beacon trajectories. In addition, we consider an accurate and reliable channel model, which helps to provide more realistic evaluation. Z-curve is compared with five existing path planning schemes based on three different localization techniques such as weighted centroid localization and trilateration with time priority and accuracy priority. Furthermore, the performance of the Z-curve is evaluated at the presence of obstacles and Z-curve obstacle-handling trajectory is proposed to mitigate the obstacle problem on localization. Simulation results show the advantages of our proposed path planning scheme over the existing schemes.
01 Jan 2015
••01 May 2005
TL;DR: In this paper, several fundamental key aspects of underwater acoustic communications are investigated and a cross-layer approach to the integration of all communication functionalities is suggested.
Abstract: Underwater sensor nodes will find applications in oceanographic data collection, pollution monitoring, offshore exploration, disaster prevention, assisted navigation and tactical surveillance applications. Moreover, unmanned or autonomous underwater vehicles (UUVs, AUVs), equipped with sensors, will enable the exploration of natural undersea resources and gathering of scientific data in collaborative monitoring missions. Underwater acoustic networking is the enabling technology for these applications. Underwater networks consist of a variable number of sensors and vehicles that are deployed to perform collaborative monitoring tasks over a given area. In this paper, several fundamental key aspects of underwater acoustic communications are investigated. Different architectures for two-dimensional and three-dimensional underwater sensor networks are discussed, and the characteristics of the underwater channel are detailed. The main challenges for the development of efficient networking solutions posed by the underwater environment are detailed and a cross-layer approach to the integration of all communication functionalities is suggested. Furthermore, open research issues are discussed and possible solution approaches are outlined. � 2005 Published by Elsevier B.V.
01 Jan 2014
TL;DR: This paper surveys the work done toward all of the outstanding issues, relating to this new class of networks, so as to spur further research in these areas.
Abstract: Unmanned aerial vehicles (UAVs) have enormous potential in the public and civil domains. These are particularly useful in applications, where human lives would otherwise be endangered. Multi-UAV systems can collaboratively complete missions more efficiently and economically as compared to single UAV systems. However, there are many issues to be resolved before effective use of UAVs can be made to provide stable and reliable context-specific networks. Much of the work carried out in the areas of mobile ad hoc networks (MANETs), and vehicular ad hoc networks (VANETs) does not address the unique characteristics of the UAV networks. UAV networks may vary from slow dynamic to dynamic and have intermittent links and fluid topology. While it is believed that ad hoc mesh network would be most suitable for UAV networks yet the architecture of multi-UAV networks has been an understudied area. Software defined networking (SDN) could facilitate flexible deployment and management of new services and help reduce cost, increase security and availability in networks. Routing demands of UAV networks go beyond the needs of MANETS and VANETS. Protocols are required that would adapt to high mobility, dynamic topology, intermittent links, power constraints, and changing link quality. UAVs may fail and the network may get partitioned making delay and disruption tolerance an important design consideration. Limited life of the node and dynamicity of the network lead to the requirement of seamless handovers, where researchers are looking at the work done in the areas of MANETs and VANETs, but the jury is still out. As energy supply on UAVs is limited, protocols in various layers should contribute toward greening of the network. This paper surveys the work done toward all of these outstanding issues, relating to this new class of networks, so as to spur further research in these areas.