scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Journal on Selected Areas in Communications in 2006"


Journal ArticleDOI
TL;DR: A novel scheme that first selects the best relay from a set of M available relays and then uses this "best" relay for cooperation between the source and the destination and achieves the same diversity-multiplexing tradeoff as achieved by more complex protocols.
Abstract: Cooperative diversity has been recently proposed as a way to form virtual antenna arrays that provide dramatic gains in slow fading wireless environments. However, most of the proposed solutions require distributed space-time coding algorithms, the careful design of which is left for future investigation if there is more than one cooperative relay. We propose a novel scheme that alleviates these problems and provides diversity gains on the order of the number of relays in the network. Our scheme first selects the best relay from a set of M available relays and then uses this "best" relay for cooperation between the source and the destination. We develop and analyze a distributed method to select the best relay that requires no topology information and is based on local measurements of the instantaneous channel conditions. This method also requires no explicit communication among the relays. The success (or failure) to select the best available path depends on the statistics of the wireless channel, and a methodology to evaluate performance for any kind of wireless channel statistics, is provided. Information theoretic analysis of outage probability shows that our scheme achieves the same diversity-multiplexing tradeoff as achieved by more complex protocols, where coordination and distributed space-time coding for M relay nodes is required, such as those proposed by Laneman and Wornell (2003). The simplicity of the technique allows for immediate implementation in existing radio hardware and its adoption could provide for improved flexibility, reliability, and efficiency in future 4G wireless systems.

3,153 citations


Journal ArticleDOI
TL;DR: It is shown that a zero-forcing beamforming (ZFBF) strategy, while generally suboptimal, can achieve the same asymptotic sum capacity as that of DPC, as the number of users goes to infinity.
Abstract: Although the capacity of multiple-input/multiple-output (MIMO) broadcast channels (BCs) can be achieved by dirty paper coding (DPC), it is difficult to implement in practical systems. This paper investigates if, for a large number of users, simpler schemes can achieve the same performance. Specifically, we show that a zero-forcing beamforming (ZFBF) strategy, while generally suboptimal, can achieve the same asymptotic sum capacity as that of DPC, as the number of users goes to infinity. In proving this asymptotic result, we provide an algorithm for determining which users should be active under ZFBF. These users are semiorthogonal to one another and can be grouped for simultaneous transmission to enhance the throughput of scheduling algorithms. Based on the user grouping, we propose and compare two fair scheduling schemes in round-robin ZFBF and proportional-fair ZFBF. We provide numerical results to confirm the optimality of ZFBF and to compare the performance of ZFBF and proposed fair scheduling schemes with that of various MIMO BC strategies.

2,078 citations


Journal ArticleDOI
TL;DR: This survey examines approaches proposed by scientists for privacy protection and integrity assurance in RFID systems, and treats the social and technical context of their work.
Abstract: This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID tags are small, wireless devices that help identify objects and people. Thanks to dropping cost, they are likely to proliferate into the billions in the next several years-and eventually into the trillions. RFID tags track objects in supply chains, and are working their way into the pockets, belongings, and even the bodies of consumers. This survey examines approaches proposed by scientists for privacy protection and integrity assurance in RFID systems, and treats the social and technical context of their work. While geared toward the nonspecialist, the survey may also serve as a reference for specialist readers.

1,994 citations


Journal ArticleDOI
TL;DR: This tutorial paper first reviews the basics of convexity, Lagrange duality, distributed subgradient method, Jacobi and Gauss-Seidel iterations, and implication of different time scales of variable updates, and introduces primal, dual, indirect, partial, and hierarchical decompositions, focusing on network utility maximization problem formulations.
Abstract: A systematic understanding of the decomposability structures in network utility maximization is key to both resource allocation and functionality allocation. It helps us obtain the most appropriate distributed algorithm for a given network resource allocation problem, and quantifies the comparison across architectural alternatives of modularized network design. Decomposition theory naturally provides the mathematical language to build an analytic foundation for the design of modularized and distributed control of networks. In this tutorial paper, we first review the basics of convexity, Lagrange duality, distributed subgradient method, Jacobi and Gauss-Seidel iterations, and implication of different time scales of variable updates. Then, we introduce primal, dual, indirect, partial, and hierarchical decompositions, focusing on network utility maximization problem formulations and the meanings of primal and dual decompositions in terms of network architectures. Finally, we present recent examples on: systematic search for alternative decompositions; decoupling techniques for coupled objective functions; and decoupling techniques for coupled constraint sets that are not readily decomposable

1,725 citations


Journal ArticleDOI
TL;DR: It is shown that a clean-slate optimization-based approach to the multihop resource allocation problem naturally results in a "loosely coupled" cross-layer solution, and how to use imperfect scheduling in the cross- layer framework is demonstrated.
Abstract: This tutorial paper overviews recent developments in optimization-based approaches for resource allocation problems in wireless systems. We begin by overviewing important results in the area of opportunistic (channel-aware) scheduling for cellular (single-hop) networks, where easily implementable myopic policies are shown to optimize system performance. We then describe key lessons learned and the main obstacles in extending the work to general resource allocation problems for multihop wireless networks. Towards this end, we show that a clean-slate optimization-based approach to the multihop resource allocation problem naturally results in a "loosely coupled" cross-layer solution. That is, the algorithms obtained map to different layers [transport, network, and medium access control/physical (MAC/PHY)] of the protocol stack, and are coupled through a limited amount of information being passed back and forth. It turns out that the optimal scheduling component at the MAC layer is very complex, and thus needs simpler (potentially imperfect) distributed solutions. We demonstrate how to use imperfect scheduling in the cross-layer framework and describe recently developed distributed algorithms along these lines. We conclude by describing a set of open research problems

899 citations


Journal ArticleDOI
TL;DR: This paper introduces the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against, and presents a general mechanism, called packet leashes, for detecting and, thus defending against wormhole attacks, and a specific protocol that implements leashes.
Abstract: As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts, and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them (possibly selectively) to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a general mechanism, called packet leashes, for detecting and, thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes. We also discuss topology-based wormhole detection, and show that it is impossible for these approaches to detect some wormhole topologies.

724 citations


Journal ArticleDOI
Zhan Guo1, P. Nilsson1
TL;DR: The implementation results show that it is feasible to achieve near-ML performance and high detection throughput for a 4/spl times/4 16-QAM MIMO system using the proposed algorithms and the VLSI architecture with reasonable complexity.
Abstract: K-best Schnorr-Euchner (KSE) decoding algorithm is proposed in this paper to approach near-maximum-likelihood (ML) performance for multiple-input-multiple-output (MIMO) detection. As a low complexity MIMO decoding algorithm, the KSE is shown to be suitable for very large scale integration (VLSI) implementations and be capable of supporting soft outputs. Modified KSE (MKSE) decoding algorithm is further proposed to improve the performance of the soft-output KSE with minor modifications. Moreover, a VLSI architecture is proposed for both algorithms. There are several low complexity and low-power features incorporated in the proposed algorithms and the VLSI architecture. The proposed hard-output KSE decoder and the soft-output MKSE decoder is implemented for 4/spl times/4 16-quadrature amplitude modulation (QAM) MIMO detection in a 0.35-/spl mu/m and a 0.13-/spl mu/m CMOS technology, respectively. The implemented hard-output KSE chip core is 5.76 mm/sup 2/ with 91 K gates. The KSE decoding throughput is up to 53.3 Mb/s with a core power consumption of 626 mW at 100 MHz clock frequency and 2.8 V supply. The implemented soft-output MKSE chip can achieve a decoding throughput of more than 100 Mb/s with a 0.56 mm/sup 2/ core area and 97 K gates. The implementation results show that it is feasible to achieve near-ML performance and high detection throughput for a 4/spl times/4 16-QAM MIMO system using the proposed algorithms and the VLSI architecture with reasonable complexity.

723 citations


Journal ArticleDOI
TL;DR: A solution is developed that optimizes the overall network throughput subject to fairness constraints on allocation of scarce wireless capacity among mobile clients, and the performance of the algorithms is within a constant factor of that of any optimal algorithm for the joint channel assignment and routing problem.
Abstract: Multihop infrastructure wireless mesh networks offer increased reliability, coverage, and reduced equipment costs over their single-hop counterpart, wireless local area networks. Equipping wireless routers with multiple radios further improves the capacity by transmitting over multiple radios simultaneously using orthogonal channels. Efficient channel assignment and routing is essential for throughput optimization of mesh clients. Efficient channel assignment schemes can greatly relieve the interference effect of close-by transmissions; effective routing schemes can alleviate potential congestion on any gateways to the Internet, thereby improving per-client throughput. Unlike previous heuristic approaches, we mathematically formulate the joint channel assignment and routing problem, taking into account the interference constraints, the number of channels in the network, and the number of radios available at each mesh router. We then use this formulation to develop a solution for our problem that optimizes the overall network throughput subject to fairness constraints on allocation of scarce wireless capacity among mobile clients. We show that the performance of our algorithms is within a constant factor of that of any optimal algorithm for the joint channel assignment and routing problem. Our evaluation demonstrates that our algorithm can effectively exploit the increased number of channels and radios, and it performs much better than the theoretical worst case bounds

679 citations


Journal ArticleDOI
TL;DR: Simulations show that the proposed trust evaluation system can significantly improve the network throughput as well as effectively detect malicious behaviors in ad hoc networks.
Abstract: The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustworthiness of other nodes without centralized authorities. In this paper, we present an information theoretic framework to quantitatively measure trust and model trust propagation in ad hoc networks. In the proposed framework, trust is a measure of uncertainty with its value represented by entropy. We develop four Axioms that address the basic understanding of trust and the rules for trust propagation. Based on these axioms, we present two trust models: entropy-based model and probability-based model, which satisfy all the axioms. Techniques of trust establishment and trust update are presented to obtain trust values from observation. The proposed trust evaluation method and trust models are employed in ad hoc networks for secure ad hoc routing and malicious node detection. A distributed scheme is designed to acquire, maintain, and update trust records associated with the behaviors of nodes' forwarding packets and the behaviors of making recommendations about other nodes. Simulations show that the proposed trust evaluation system can significantly improve the network throughput as well as effectively detect malicious behaviors in ad hoc networks.

649 citations


Journal ArticleDOI
TL;DR: This work uses the theory of semirings to show how two nodes can establish an indirect trust relation without previous direct interaction, and shows that the semiring framework is flexible enough to express other trust models, most notably PGP's Web of Trust.
Abstract: Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence created by the previous interactions of entities within a protocol. In this work, we are focusing on the evaluation of trust evidence in ad hoc networks. Because of the dynamic nature of ad hoc networks, trust evidence may be uncertain and incomplete. Also, no preestablished infrastructure can be assumed. The evaluation process is modeled as a path problem on a directed graph, where nodes represent entities, and edges represent trust relations. We give intuitive requirements and discuss design issues for any trust evaluation algorithm. Using the theory of semirings, we show how two nodes can establish an indirect trust relation without previous direct interaction. We show that our semiring framework is flexible enough to express other trust models, most notably PGP's Web of Trust. Our scheme is shown to be robust in the presence of attackers.

543 citations


Journal ArticleDOI
TL;DR: This tutorial gives an interpretation of Lagrangian duality in a multiuser multi-antenna communication problem; it illustrates the role of semidefinite relaxation inMultiuser detection problems; and methods to formulate robust optimization problems via second-order cone programming techniques are reviewed.
Abstract: Convex optimization methods are widely used in the design and analysis of communication systems and signal processing algorithms. This tutorial surveys some of recent progress in this area. The tutorial contains two parts. The first part gives a survey of basic concepts and main techniques in convex optimization. Special emphasis is placed on a class of conic optimization problems, including second-order cone programming and semidefinite programming. The second half of the survey gives several examples of the application of conic programming to communication problems. We give an interpretation of Lagrangian duality in a multiuser multi-antenna communication problem; we illustrate the role of semidefinite relaxation in multiuser detection problems; we review methods to formulate robust optimization problems via second-order cone programming techniques

Journal ArticleDOI
TL;DR: This paper proposes a mechanism for secure positioning of wireless devices, that is verifiable multilateration, and shows how this mechanism can be used to secure positioning in sensor networks.
Abstract: So far, the problem of positioning in wireless networks has been studied mainly in a nonadversarial setting. In this paper, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call verifiable multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations.

Journal ArticleDOI
TL;DR: The main contribution is to prove the asymptotic optimality of a primal-dual congestion controller, which is known to model different versions of transmission control protocol well.
Abstract: In this paper, we describe and analyze a joint scheduling, routing and congestion control mechanism for wireless networks, that asymptotically guarantees stability of the buffers and fair allocation of the network resources. The queue-lengths serve as common information to different layers of the network protocol stack. Our main contribution is to prove the asymptotic optimality of a primal-dual congestion controller, which is known to model different versions of transmission control protocol well

Journal ArticleDOI
TL;DR: A random access protocol is proposed that is shown to achieve airtime fairness and a distributed version of this protocol that uses only local information is proposed based on homo egualis anthropological model.
Abstract: One of the reasons for the limitation of bandwidth in current generation wireless networks is the spectrum policy of the Federal Communications Commission (FCC). But, with the spectrum policy reform, open spectrum wireless networks, and spectrum agile radios are set to drive next general wireless networks. In this paper, we investigate continuous-time Markov models for dynamic spectrum access in open spectrum wireless networks. Both queueing and no queueing cases are considered. Analytical results are derived based on the Markov models. A random access protocol is proposed that is shown to achieve airtime fairness. A distributed version of this protocol that uses only local information is also proposed based on homo egualis anthropological model. Inequality aversion by the radio systems to achieve fairness is captured by this model. These protocols are then extended to spectrum agile radios. Extensive simulation results are presented to compare the performances of fixed versus agile radios.

Journal ArticleDOI
TL;DR: A suite of location-based compromise-tolerant security mechanisms, based on a new cryptographic concept called pairing, by binding private keys of individual nodes to both their IDs and geographic locations, and an LBK-based neighborhood authentication scheme to localize the impact of compromised nodes to their vicinity are proposed.
Abstract: Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose a suite of location-based compromise-tolerant security mechanisms. Based on a new cryptographic concept called pairing, we propose the notion of location-based keys (LBKs) by binding private keys of individual nodes to both their IDs and geographic locations. We then develop an LBK-based neighborhood authentication scheme to localize the impact of compromised nodes to their vicinity. We also present efficient approaches to establish a shared key between any two network nodes. In contrast to previous key establishment solutions, our approaches feature nearly perfect resilience to node compromise, low communication and computation overhead, low memory requirements, and high network scalability. Moreover, we demonstrate the efficacy of LBKs in counteracting several notorious attacks against sensor networks such as the Sybil attack, the identity replication attack, and wormhole and sinkhole attacks. Finally, we propose a location-based threshold-endorsement scheme, called LTE, to thwart the infamous bogus data injection attack, in which adversaries inject lots of bogus data into the network. The utility of LTE in achieving remarkable energy savings is validated by detailed performance evaluation.

Journal ArticleDOI
TL;DR: This paper presents a form of digital multicarrier modulation which is referred to as overlapped discrete multitone, or discrete wavelet multitone (DWMT), modulation, which is based on the application of M-band wavelet filters, and designed to achieve a combination of subchannel spectral containment and bandwidth efficiency that is fundamentally better than with other forms of multicarriers modulation.
Abstract: Multicarrier modulation possesses several properties which make it an attractive approach for high speed copper wire communication networks. Among these properties are the ability to efficiently access and distribute multiplexed data streams, and a reduced susceptibility to impulsive, as well as to narrowband channel disturbances. In digital implementations of multicarrier modulation, subcarrier generation and data modulation are accomplished digitally using orthogonal transformations of data blocks. These implementations are particularly efficient with regard to bandwidth utilization and transceiver complexity. In this paper, we present a form of digital multicarrier modulation which we refer to as overlapped discrete multitone, or discrete wavelet multitone (DWMT), modulation. For DWMT modulation, which is based on the application of M-band wavelet filters, the pulses for different data blocks overlap in time, and are designed to achieve a combination of subchannel spectral containment and bandwidth efficiency that is fundamentally better than with other forms of multicarrier modulation. We show that, as a result of the spectral containment feature, DWMT gives a high level of robustness with regard to noise environments and channel variations that are encountered in practice

Journal ArticleDOI
TL;DR: A model to study the phenomenon of free-riding and free-identities in peer-to-peer systems finds that imposing penalty on all users that join the system is effective under many scenarios and that system performance degrades significantly only when the turnover rate among users is high.
Abstract: We devise a model to study the phenomenon of free-riding and free-identities in peer-to-peer systems. At the heart of our model is a user of a certain type, an intrinsic and private parameter that reflects the user's willingness to contribute resources to the system. A user decides whether to contribute or free-ride based on how the current contribution cost in the system compares to her type. We study the impact of mechanisms that exclude low type users or, more realistically, penalize free-riders with degraded service. We also consider dynamic scenarios with arrivals and departures of users, and with whitewashers -users who leave the system and rejoin with new identities to avoid reputational penalties. We find that imposing penalty on all users that join the system is effective under many scenarios. In particular, system performance degrades significantly only when the turnover rate among users is high. Finally, we show that the optimal exclusion or penalty level differs significantly from the level that optimizes the performance of contributors only for a limited range of societal generosity levels.

Journal ArticleDOI
TL;DR: A simple statistical channel model is proposed and a practical implementation useful for evaluating UWB body area communication systems is proposed.
Abstract: Using ultra-wideband (UWB) wireless sensors placed on a person to continuously monitor health information is a promising new application. However, there are currently no detailed models describing the UWB radio channel around the human body making it difficult to design a suitable communication system. To address this problem, we have measured radio propagation around the body in a typical indoor environment and incorporated these results into a simple model. We then implemented this model on a computer and compared experimental data with the simulation results. This paper proposes a simple statistical channel model and a practical implementation useful for evaluating UWB body area communication systems.

Journal ArticleDOI
TL;DR: It is shown that the proposed approach results in significant improvements in the total utility achieved at equilibrium compared with a single-carrier system and also to a multicarrier system in which each user maximizes its utility over each carrier independently.
Abstract: A game-theoretic model for studying power control in multicarrier code-division multiple-access systems is proposed. Power control is modeled as a noncooperative game in which each user decides how much power to transmit over each carrier to maximize its own utility. The utility function considered here measures the number of reliable bits transmitted over all the carriers per joule of energy consumed and is particularly suitable for networks where energy efficiency is important. The multidimensional nature of users' strategies and the nonquasi-concavity of the utility function make the multicarrier problem much more challenging than the single-carrier or throughput-based-utility case. It is shown that, for all linear receivers including the matched filter, the decorrelator, and the minimum-mean-square-error detector, a user's utility is maximized when the user transmits only on its "best" carrier. This is the carrier that requires the least amount of power to achieve a particular target signal-to-interference-plus-noise ratio at the output of the receiver. The existence and uniqueness of Nash equilibrium for the proposed power control game are studied. In particular, conditions are given that must be satisfied by the channel gains for a Nash equilibrium to exist, and the distribution of the users among the carriers at equilibrium is characterized. In addition, an iterative and distributed algorithm for reaching the equilibrium (when it exists) is presented. It is shown that the proposed approach results in significant improvements in the total utility achieved at equilibrium compared with a single-carrier system and also to a multicarrier system in which each user maximizes its utility over each carrier independently

Journal ArticleDOI
TL;DR: A mathematically tractable and accurate model of narrowband power line noise based on experimental measurements is introduced, expressed as a Gaussian process whose instantaneous variance is a periodic time function.
Abstract: This manuscript introduces a mathematically tractable and accurate model of narrowband power line noise based on experimental measurements. In this paper, the noise is expressed as a Gaussian process whose instantaneous variance is a periodic time function. With this assumption and representation, the cyclostationary features of power line noise can be described in close form. The periodic function that represents the variance is then approximated with a small number of parameters. The noise waveform generated with this model shows good agreement with that of actually measured noise. Noise waveforms generated by different models are also compared with that of the proposed model.

Journal ArticleDOI
TL;DR: This paper proposes a polynomial time near-optimal algorithm which recursively computes minimum weighted Dominating Sets (DS) while consistently preserving QoS requirements across iterations, and shows that it outperforms other alternative schemes.
Abstract: In a wireless mesh network (WMN), the traffic is aggregated and forwarded towards the gateways. Strategically placing and connecting the gateways to the wired backbone is critical to the management and efficient operation of a WMN. In this paper, we address the problem of gateways placement, consisting in placing a minimum number of gateways such that quality-of-service (QoS) requirements are satisfied. We propose a polynomial time near-optimal algorithm which recursively computes minimum weighted Dominating Sets (DS), while consistently preserving QoS requirements across iterations. We evaluate the performance of our algorithm using both analysis and simulation, and show that it outperforms other alternative schemes by comparing the number of gateways placed in different scenarios

Journal ArticleDOI
TL;DR: This paper studies the resource allocation for orthogonal frequency-division multiple-access relay network with multiple source nodes, multiple relay nodes, and a single destination node using a graph theoretical approach.
Abstract: This paper studies the resource allocation for orthogonal frequency-division multiple-access relay network with multiple source nodes, multiple relay nodes, and a single destination node. The optimal source/relay/subcarrier allocation problem with fairness constraint on relay nodes is formulated as a binary integer programming problem. The problem is then tackled using a graph theoretical approach by transforming it into a linear optimal distribution problem in a directed graph. Upper bound of the solution is discussed and simulation results are studied to evaluate the algorithm performance

Journal ArticleDOI
TL;DR: An analytical model for large system mean mutual information values and the impact of elevation spectrum on MI is presented and a composite channel impulse model for the cross-polarized channel that takes into account both azimuth and elevation spectrum is proposed.
Abstract: Fourth-generation (4G) systems are expected to support data rates of the order of 100 Mb/s in the outdoor environment and 1 Gb/s in the indoor/stationary environment. In order to support such large payloads, the radio physical layer must employ receiver algorithms that provide a significant increase in spectrum efficiency (and, hence, capacity) over current wireless systems. Recently, an explosion of multiple-input-multiple-output (MIMO) studies have appeared with many journals presenting special issues on this subject. This has occurred due to the potential of MIMO to provide a linear increase in capacity with antenna numbers. Environmental considerations and tower loads will often restrict the placing of large antenna spans on base stations (BSs). Similarly, customer device form factors also place a limit on the antenna numbers that can be placed with a mutual spacing of 0.5 wavelength. The use of cross-polarized antennas is widely used in modern cellular installations as it reduces spacing needs and tower loads on BSs. Hence, this approach is also receiving considerable attention in MIMO systems. In order to study and compare various receiver architectures that are based on MIMO techniques, one needs to have an accurate knowledge of the MIMO channel. However, very few studies have appeared that characterize the cross-polarized MIMO channel. Recently, the third-generation partnership standards bodies (3GPP/3GPP2) have defined a cross-polarized channel model for MIMO systems but this model neglects the elevation spectrum. In this paper, we provide a deeper understanding of the channel model for cross-polarized systems for different environments and propose a composite channel impulse model for the cross-polarized channel that takes into account both azimuth and elevation spectrum. We use the resulting channel impulse response to derive closed-form expressions for the spatial correlation. We also present models to describe the dependence of cross-polarization discrimination (XPD) on distance, azimuth and elevation and delay spread. In addition, we study the impact of array width, signal-to-noise ratio, and antenna slant angle on the mutual information (MI) of the system. In particular, we present an analytical model for large system mean mutual information values and consider the impact of elevation spectrum on MI. Finally, the impact of multipath delays on XPD and MI is also explored.

Journal ArticleDOI
TL;DR: A channel model proposal based on a linear periodically time-varying system and cyclostationary random noise is proposed based on the properties of indoor power line communications channels when they are used for broadband transmission.
Abstract: The purpose of this paper is to analyze the properties of indoor power line communications channels when they are used for broadband transmission. It will be shown that these channels exhibit a short-term variation, due to the fact that high-frequency parameters of electrical devices depend on the instantaneous amplitude of mains voltage. This phenomenon leads to a channel model proposal based on a linear periodically time-varying system and cyclostationary random noise. A measurement system, designed to capture these time variations in real power networks, and some of the most significant results obtained with it, are presented. In addition, a statistical analysis of the measurements performed in several indoor power line scenarios is included, so that the relevance of time variations in actual channels can be evaluated.

Journal ArticleDOI
TL;DR: A unified geometric interpretation for wireless quality-aware routing metrics is provided and empirical observations of a real-world wireless mesh network suggest that mETX and ENT could achieve a 50% reduction in the average packet loss rate compared with ETX.
Abstract: This paper considers the problem of selecting good paths in a wireless mesh network. It is well-known that picking the path with the smallest number of hops between two nodes often leads to poor performance, because such paths tend to use links that could have marginal quality. As a result, quality-aware routing metrics are desired for networks that are built solely from wireless radios. Previous work has developed metrics (such as ETX) that work well when wireless channel conditions are relatively static (DeCouto , 2003), but typical wireless channels experience variations at many time-scales. For example, channels may have low average packet loss ratios, but with high variability, implying that metrics that use the mean loss ratio will perform poorly. In this paper, we describe two new metrics, called modified expected number of transmissions (mETX) and effective number of transmissions (ENT) that work well under a wide variety of channel conditions. In addition to analyzing and evaluating the performance of these metrics, we provide a unified geometric interpretation for wireless quality-aware routing metrics. Empirical observations of a real-world wireless mesh network suggest that mETX and ENT could achieve a 50% reduction in the average packet loss rate compared with ETX

Journal ArticleDOI
TL;DR: A communication scheme that uses the power line to initialize and synchronize wireless amplify-and-forward relays and to broadcast information between the relays is considered, designed to optimally exploit the frequency diversity available on PLC channels.
Abstract: In this paper, we investigate the use of power line communication (PLC) to assist cooperative wireless relaying. We consider a communication scheme that uses the power line to initialize and synchronize wireless amplify-and-forward relays and to broadcast information between the relays. Starting from an analysis of transfer functions and noise measurements of PLC channels in office and residential environments, we propose a power line transmission scheme for the inter-relay-communication and assess the influence of this scheme on wireless relaying. This scheme is based on linear precoded orthogonal frequency-division multiplexing; it is designed to optimally exploit the frequency diversity available on PLC channels. The use of PLC leads to a very flexible way of enhancing wireless communications by plugging in additional relays where they are needed-without additional wiring.

Journal ArticleDOI
TL;DR: The results show that the proposed scheme can effectively mitigate error propagation due to erroneous decoding at the relay and approaches the outage probability bound of a distributed two-hop relay network at high signal-to-noise ratios.
Abstract: It has been shown that distributed turbo coding (DTC) can approach the capacity of a wireless relay network. In the existing DTC schemes, it is usually assumed that error-free decoding is performed at a relay. We refer to this type of DTC schemes as perfect DTC. In this paper, we propose a novel DTC scheme. For the proposed scheme, instead of making a decision on the transmitted information symbols at the relay as in perfect DTC, we calculate and forward the corresponding soft information. We derive parity symbol soft estimates for the interleaved source information when only the a posteriori probabilities of the information symbols are known. The results show that the proposed scheme can effectively mitigate error propagation due to erroneous decoding at the relay. Simulation results also confirm that the proposed scheme approaches the outage probability bound of a distributed two-hop relay network at high signal-to-noise ratios

Journal ArticleDOI
TL;DR: This work formalizes the map of the Internet problem as a combinatorial optimization problem and considers it for two different models characterized by different types of measurements, giving several upper and lower bounds on the competitive ratio and the approximation ratio in both models.
Abstract: Due to its fast, dynamic, and distributed growth process, it is hard to obtain an accurate map of the Internet. In many cases, such a map-representing the structure of the Internet as a graph with nodes and links-is a prerequisite when investigating properties of the Internet. A common way to obtain such maps is to make certain local measurements at a small subset of the nodes, and then to combine these in order to "discover" (an approximation of) the actual graph. Each of these measurements is potentially quite costly. It is thus a natural objective to minimize the number of measurements which still discover the whole graph. We formalize this problem as a combinatorial optimization problem and consider it for two different models characterized by different types of measurements. We give several upper and lower bounds on the competitive ratio (for the online network discovery problem) and the approximation ratio (for the offline network verification problem) in both models. Furthermore, for one of the two models, we compare four simple greedy strategies in an experimental analysis

Journal ArticleDOI
TL;DR: This work presents hardware-implementable pattern matching algorithm for content filtering applications, which is scalable in terms of speed, the number of patterns and the pattern length, and is based on a memory efficient multihashing data structure called Bloom filter.
Abstract: High-speed packet content inspection and filtering devices rely on a fast multipattern matching algorithm which is used to detect predefined keywords or signatures in the packets. Multipattern matching is known to require intensive memory accesses and is often a performance bottleneck. Hence, specialized hardware-accelerated algorithms are required for line-speed packet processing. We present hardware-implementable pattern matching algorithm for content filtering applications, which is scalable in terms of speed, the number of patterns and the pattern length. Our algorithm is based on a memory efficient multihashing data structure called Bloom filter. We use embedded on-chip memory blocks in field programmable gate array/very large scale integration chips to construct Bloom filters which can suppress a large fraction of memory accesses and speed up string matching. Based on this concept, we first present a simple algorithm which can scan for several thousand short (up to 16 bytes) patterns at multigigabit per second speeds with a moderately small amount of embedded memory and a few mega bytes of external memory. Furthermore, we modify this algorithm to be able to handle arbitrarily large strings at the cost of a little more on-chip memory. We demonstrate the merit of our algorithm through theoretical analysis and simulations performed on Snort's string set

Journal ArticleDOI
TL;DR: This paper proposes a range-independent localization algorithm called high-resolution range- independent localization (HiRLoc), that allows sensors to passively determine their location with high resolution, without increasing the number of reference points, or the complexity of the hardware of each reference point.
Abstract: In this paper, we address the problem of robustly estimating the position of randomly deployed nodes of a wireless sensor network (WSN), in the presence of security threats. We propose a range-independent localization algorithm called high-resolution range-independent localization (HiRLoc), that allows sensors to passively determine their location with high resolution, without increasing the number of reference points, or the complexity of the hardware of each reference point. In HiRLoc, sensors determine their location based on the intersection of the areas covered by the beacons transmitted by multiple reference points. By combining the communication range constraints imposed by the physical medium with computationally efficient cryptographic primitives that secure the beacon transmissions, we show that HiRLoc is robust against known attacks on WSN, such as the wormhole attack, the Sybil attack, and compromise of network entities. Finally, our performance evaluation shows that HiRLoc leads to a significant improvement in localization accuracy compared with state-of-the-art range-independent localization schemes, while requiring fewer reference points.