scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Transactions on Mobile Computing in 2007"


Journal ArticleDOI
TL;DR: A simplified model based on the renewal theory is used to study how the parameters of the distribution impact the performance in terms of the delivery delay of well-founded opportunistic forwarding algorithms in the context of human-carried devices.
Abstract: We study data transfer opportunities between wireless devices carried by humans. We observe that the distribution of the intercontact time (the time gap separating two contacts between the same pair of devices) may be well approximated by a power law over the range [10 minutes; 1 day]. This observation is confirmed using eight distinct experimental data sets. It is at odds with the exponential decay implied by the most commonly used mobility models. In this paper, we study how this newly uncovered characteristic of human mobility impacts one class of forwarding algorithms previously proposed. We use a simplified model based on the renewal theory to study how the parameters of the distribution impact the performance in terms of the delivery delay of these algorithms. We make recommendations for the design of well-founded opportunistic forwarding algorithms in the context of human-carried devices

998 citations


Journal ArticleDOI
TL;DR: The main idea of the 2ACK scheme is to send two-hop acknowledgment packets in the opposite direction of the routing path in order to reduce additional routing overhead.
Abstract: We study routing misbehavior in MANETs (mobile ad hoc networks) in this paper. In general, routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative. However, due to the open structure and scarcely available battery-based energy, node misbehaviors may exist. One such routing misbehavior is that some selfish nodes will participate in the route discovery and maintenance processes but refuse to forward data packets. In this paper, we propose the 2ACK scheme that serves as an add-on technique for routing schemes to detect routing misbehavior and to mitigate their adverse effect. The main idea of the 2ACK scheme is to send two-hop acknowledgment packets in the opposite direction of the routing path. In order to reduce additional routing overhead, only a fraction of the received data packets are acknowledged in the 2ACK scheme. Analytical and simulation results are presented to evaluate the performance of the proposed scheme

485 citations


Journal ArticleDOI
TL;DR: This paper studies two problems in secondary spectrum access with minimum signal to interference noise ratio (quality of service (QoS) guarantee under an interference temperature constraint and proposes a centralized reduced complexity search algorithm to find the optimal solution.
Abstract: Spectrum is one of the most precious radio resources. With the increasing demand for wireless communication, efficiently using the spectrum resource has become an essential issue. With the Federal Communications Commission's (FCC) spectrum policy reform, secondary spectrum sharing has gained increasing interest. One of the policy reforms introduces the concept of an interference temperature - the total allowable interference in a spectral band. This means that secondary users can use different transmit powers as long as the sum of these power is less than the interference threshold. In this paper, we study two problems in secondary spectrum access with minimum signal to interference noise ratio (quality of service (QoS)) guarantee under an interference temperature constraint. First, when all the secondary links can be supported, a nonlinear optimization problem with the objective to maximize the total transmitting rate of the secondary users is formulated. The nonlinear optimization is solved efficiently using geometric programming techniques. The second problem we address is, when not all the secondary links can be supported with their QoS requirement, it is desirable to have the spectrum access opportunity proportional to the user priority if they belong to different priority classes. In this context, we formulate an operator problem which takes the priority issues into consideration. To solve this problem, first, we propose a centralized reduced complexity search algorithm to find the optimal solution. Then, in order to solve this problem distributively, we define a secondary spectrum sharing potential game. The Nash equilibria of this potential game are investigated. The efficiency of the Nash equilibria solutions are characterized. It is shown that distributed sequential play and an algorithm based on stochastic learning attain the equilibrium solutions. Finally, the performances are examined through simulations

461 citations


Journal ArticleDOI
TL;DR: It is shown that, due to the variability of RSS features over space, a spatially localized positioning method leads to improved positioning results and a kernelized distance calculation algorithm for comparing RSS observations to RSS training records is presented.
Abstract: The recent proliferation of location-based services (LBSs) has necessitated the development of effective indoor positioning solutions. In such a context, wireless local area network (WLAN) positioning is a particularly viable solution in terms of hardware and installation costs due to the ubiquity of WLAN infrastructures. This paper examines three aspects of the problem of indoor WLAN positioning using received signal strength (RSS). First, we show that, due to the variability of RSS features over space, a spatially localized positioning method leads to improved positioning results. Second, we explore the problem of access point (AP) selection for positioning and demonstrate the need for further research in this area. Third, we present a kernelized distance calculation algorithm for comparing RSS observations to RSS training records. Experimental results indicate that the proposed system leads to a 17 percent (0.56 m) improvement over the widely used K-nearest neighbor and histogram-based methods

428 citations


Journal ArticleDOI
TL;DR: A metric that estimates the average waiting time for each potential next hop is designed, which provides performance similar to that of schemes that have global knowledge of the network topology, yet without requiring that knowledge.
Abstract: Delay-tolerant networks (DTNs) have the potential to interconnect devices in regions that current networking technology cannot reach. To realize the DTN vision, routes must be found over multiple unreliable, intermittently-connected hops. In this paper we present a practical routing protocol that uses only observed information about the network. We designed a metric that estimates the average waiting time for each potential next hop. This learned topology information is distributed using a link-state routing protocol, where the link-state packets are "flooded" using epidemic routing. The routing is recomputed each time connections are established, allowing messages to take advantage of unpredictable contacts. A message is forwarded if the topology suggests that the connected node is "closer" to the destination than the current node. We demonstrate through simulation that our protocol provides performance similar to that of schemes that have global knowledge of the network topology, yet without requiring that knowledge. Further, it requires significantly less resources than the alternative, epidemic routing, suggesting that our approach scales better with the number of messages in the network. This performance is achieved with minimal protocol overhead for networks of approximately 100 nodes.

380 citations


Journal ArticleDOI
TL;DR: This work formulates the problem of scheduling the mobile element in the network so that there is no data loss due to buffer overflow and the problem is shown to be NP-complete and an integer-linear-programming formulation is given.
Abstract: Wireless networks have historically considered support for mobile elements's an extra overhead. However, recent research has provided the means by which a network can take advantage of mobile elements. Particularly in the case of wireless sensor networks, mobile elements can be deliberately built into the system to improve the lifetime of the network and act as mechanical carriers of data. The mobile element, whose mobility is controlled, visits the nodes to collect their data before their buffers are full. In general, the spatio-temporal dynamics of the sensed phenomenon may require sensor nodes to collect samples at different rates, in which case, some nodes need to be visited more frequently than others. This work formulates the problem of scheduling the mobile element in the network so that there is no data loss due to buffer overflow. The problem is shown to be NP-complete and an integer-linear-programming formulation is given. Finally, some computationally practical algorithms for a single mobile and for the case of multiple mobiles are presented and their performances compared

290 citations


Journal ArticleDOI
TL;DR: The results highlight that the rtPS scheduling service is a very robust scheduling service for meeting the delay requirements of multimedia applications.
Abstract: The IEEE 802.16 is a standard for broadband wireless communication in metropolitan area networks (MAN). To meet the QoS requirements of multimedia applications, the IEEE 802.16 standard provides four different scheduling services: unsolicited grant service (UGS), real-time polling service (rtPS), non-real-time polling service (nrtPS), and Best Effort (BE). The paper is aimed at verifying, via simulation, the effectiveness of rtPS, nrtPS, and BE (but UGS) in managing traffic generated by data and multimedia sources. Performance is assessed for an IEEE 802.16 wireless system working in point-to-multipoint (PMP) mode, with frequency division duplex (FDD), and with full-duplex subscriber stations (SSs). Our results show that the performance of the system, in terms of throughput and delay, depends on several factors. These include the frame duration, the mechanisms for requesting uplink bandwidth, and the offered load partitioning, i.e., the way traffic is distributed among SSs, connections within each SS, and traffic sources within each connection. The results also highlight that the rtPS scheduling service is a very robust scheduling service for meeting the delay requirements of multimedia applications

282 citations


Journal ArticleDOI
TL;DR: A queuing analytical model is presented, based on a multidimensional discrete-time Markov chain, that would be useful for the design and optimization of energy-efficient protocols for solar-powered wireless sensor/mesh networks under quality-of-service (QoS) constraints.
Abstract: A queuing analytical model is presented to investigate the performances of different sleep and wakeup strategies in a solar-powered wireless sensor/mesh network where a solar cell is used to charge the battery in a sensor/mesh node. While the solar radiation process (and, hence, the energy generation process in a solar cell) is modeled by a stochastic process (i.e., a Markov chain), a linear battery model with relaxation effect is used to model the battery capacity recovery process. Developed based on a multidimensional discrete-time Markov chain, the presented model is used to analyze the performances of different sleep and wakeup strategies in a sensor/mesh node. The packet dropping and packet blocking probabilities at a node are the major performance metrics. The numerical results obtained from the analytical model are validated by extensive simulations. In addition, using the queuing model, based on a game-theoretic formulation, we demonstrate how to obtain the optimal parameters for a particular sleep and wakeup strategy. In this case, we formulate a bargaining game by exploiting the trade-off between packet blocking and packet dropping probabilities due to the sleep and wakeup dynamics in a sensor/mesh node. The Nash solution is obtained for the equilibrium point of sleep and wakeup probabilities. The presented queuing model, along with the game-theoretic formulation, would be useful for the design and optimization of energy-efficient protocols for solar-powered wireless sensor/mesh networks under quality-of-service (QoS) constraints

240 citations


Journal ArticleDOI
TL;DR: Two bidding protocols are designed to guide the movement of mobile sensors in such sensor networks to increase the coverage to a desirable level and achieve suitable trade-off between coverage and sensor cost.
Abstract: Constructing a sensor network with a mix of mobile and static sensors can achieve a balance between sensor coverage and sensor cost. In this paper, we design two bidding protocols to guide the movement of mobile sensors in such sensor networks to increase the coverage to a desirable level. In the protocols, static sensors detect coverage holes locally by using Voronoi diagrams and bid mobile sensors to move. Mobile sensors accept the highest bids and heal the largest holes. Simulation results show that our protocols achieve suitable trade-off between coverage and sensor cost

235 citations


Journal ArticleDOI
TL;DR: Performance evaluation shows how global network objectives, such as compliance with real-time constraints and minimum energy consumption, can be achieved in the proposed framework with simple interactions between sensors and actors that are suitable for large-scale networks of energy-constrained devices.
Abstract: In this paper, coordination and communication problems in wireless sensor and actor networks (WSANs) are jointly addressed in a unifying framework. A sensor-actor coordination model is proposed based on an event-driven partitioning paradigm. Sensors are partitioned into different sets, and each set is constituted by a data-delivery tree associated with a different actor. The optimal solution for the partitioning strategy is determined by mathematical programming, and a distributed solution is proposed. In addition, a new model for the actor-actor coordination problem is introduced. The actor coordination is formulated as a task assignment optimization problem for a class of coordination problems in which the area to be acted upon needs to be optimally split among different actors. An auction-based distributed solution of the problem is also presented. Performance evaluation shows how global network objectives, such as compliance with real-time constraints and minimum energy consumption, can be achieved in the proposed framework with simple interactions between sensors and actors that are suitable for large-scale networks of energy-constrained devices.

226 citations


Journal ArticleDOI
TL;DR: The goal of this work is to design techniques and protocols that lead to efficient data aggregation without explicit maintenance of a structure, and proposes two corresponding mechanisms - data-aware anycast at the MAC layer and randomized waiting at the application layer.
Abstract: Data aggregation protocols can reduce the communication cost, thereby extending the lifetime of sensor networks. Prior works on data aggregation protocols have focused on tree-based or cluster-based structured approaches. Although structured approaches are suited for data gathering applications, they incur high maintenance overhead in dynamic scenarios for event-based applications. The goal of our work is to design techniques and protocols that lead to efficient data aggregation without explicit maintenance of a structure. As packets need to converge spatially and temporally for data aggregation, we propose two corresponding mechanisms - data-aware anycast at the MAC layer and randomized waiting at the application layer. We model the performance of the combined protocol that uses both the approaches and show that our analysis matches with the simulations. Using extensive simulations and experiments on a testbed with implementation in TinyOS, we study the performance and potential of structure-free data aggregation.

Journal ArticleDOI
S.A. Golden1, S.S. Bateman1
TL;DR: A novel time of arrival (TOA) approach that Intel research has developed can deliver significant performance improvements over signal-strength-based measurements, as shown in this paper.
Abstract: Wireless local area network (WLAN) location is the perfect complement to global positioning system (GPS) receivers for providing users with location information. WLAN operates in many areas in which GPS receivers cannot establish a lock, such as in indoor environments and metropolitan (obstruction by tall buildings) areas. There are many references to WLAN location in scientific literature. Most of this literature concentrates on signal-strength-based approaches. The advantage of signal strength approaches is that they are easy to implement, usually only requiring software modifications. In this paper, we discuss a novel time of arrival (TOA) approach that Intel research has developed. Although this approach typically requires minor silicon or firmware modifications to implement, it can deliver significant performance improvements over signal-strength-based measurements, as shown in this paper. Currently, Intel is introducing this method as an approach to add fine-accuracy location into the IEEE WLAN standard, 802.11 v.

Journal ArticleDOI
TL;DR: A novel learning algorithm is proposed that builds location-estimation systems based on a small fraction of the calibration data that traditional techniques require and a collection of user traces that can be cheaply obtained to reduce both the sampling time and the number of locations sampled in constructing a radio map.
Abstract: WLAN location estimation based on 802.11 signal strength is becoming increasingly prevalent in today's pervasive computing applications. Among the well-established location determination approaches, probabilistic techniques show good performance and, thus, become increasingly popular. For these techniques to achieve a high level of accuracy, however, a large number of training samples are usually required for calibration, which incurs a great amount of offline manual effort. In this paper, we aim to solve the problem by reducing both the sampling time and the number of locations sampled in constructing a radio map. We propose a novel learning algorithm that builds location-estimation systems based on a small fraction of the calibration data that traditional techniques require and a collection of user traces that can be cheaply obtained. When the number of sampled locations is reduced, an interpolation method is developed to effectively patch a radio map. Extensive experiments show that our proposed methods are effective in reducing the calibration effort. In particular, unlabeled user traces can be used to compensate for the effects of reducing the calibration effort and can even improve the system performance. Consequently, manual effort can be reduced substantially while a high level of accuracy is still achieved

Journal ArticleDOI
TL;DR: Using support vector regression, this work investigates the missing value location estimation problem by providing theoretical and empirical analysis on existing and novel kernels and shows promising performances, especially in terrains with local variations in environmental factors.
Abstract: Location estimation using the global system for mobile communication (GSM) is an emerging application that infers the location of the mobile receiver from multiple signals measurements While geometrical and signal propagation models have been deployed to tackle this estimation problem, the terrain factors and power fluctuations have confined the accuracy of such estimation Using support vector regression, we investigate the missing value location estimation problem by providing theoretical and empirical analysis on existing and novel kernels A novel synthetic experiment is designed to compare the performances of different location estimation approaches The proposed support vector regression approach shows promising performances, especially in terrains with local variations in environmental factors


Journal ArticleDOI
TL;DR: A cross-layer framework for optimizing global power consumption and balancing the load in sensor networks through greedy local decisions that enables each node to use its local and neighborhood state information to adapt its routing and MAC layer behavior.
Abstract: Most sensor networks require application-specific network-wide performance guarantees, suggesting the need for global and flexible network optimization. The dynamic and nonuniform local states of individual nodes in sensor networks complicate global optimization. Here, we present a cross-layer framework for optimizing global power consumption and balancing the load in sensor networks through greedy local decisions. Our framework enables each node to use its local and neighborhood state information to adapt its routing and MAC layer behavior. The framework employs a flexible cost function at the routing layer and adaptive duty cycles at the MAC layer in order to adapt a node's behavior to its local state. We identify three state aspects that impact energy consumption: 1) number of descendants in the routing tree, 2) radio duty cycle, and 3) role. We conduct experiments on a test-bed of 14 mica2 sensor nodes to compare the state representations and to evaluate the framework's energy benefits. The experiments show that the degree of load balancing increases for expanded state representations. The experiments also reveal that all state representations in our framework reduce global power consumption in the range of one-third for a time-driven monitoring network and in the range of one-fifth for an event-driven target tracking network.

Journal ArticleDOI
TL;DR: An optimized flooding scheme that minimizes transmission overhead in flooding is introduced and two simple and effective DFT-MSN data delivery schemes are proposed, namely, the replication-based efficient data delivery scheme (RED) and the message fault tolerance-based adaptive data Delivery scheme (FAD).
Abstract: This paper focuses on the delay/fault-tolerant mobile sensor network (DFT-MSN) for pervasive information gathering. We develop simple and efficient data delivery schemes tailored for DFT-MSN, which has several unique characteristics, such as sensor mobility, loose connectivity, fault tolerability, delay tolerability, and buffer limit. We first study two basic approaches, namely, direct transmission and flooding. We analyze their performance by using queuing theory and statistics. Based on the analytic results that show the trade-off between data delivery delay/ratio and transmission overhead, we introduce an optimized flooding scheme that minimizes transmission overhead in flooding. Then, we propose two simple and effective DFT-MSN data delivery schemes, namely, the replication-based efficient data delivery scheme (RED) and the message fault tolerance-based adaptive data delivery scheme (FAD). The RED scheme utilizes the erasure coding technology in order to achieve the desired data delivery ratio with minimum overhead. It consists of two key components for data transmission and message management. The former makes the decision on when and where to transmit data messages according to the delivery probability, which is the likelihood that a sensor can deliver data messages to the sink. The latter decides the optimal erasure coding parameters (including the number of data blocks and the needed redundancy) based on its current delivery probability. The FAD scheme employs the message fault tolerance, which indicates the importance of the messages. The decisions on message transmission and dropping are made based on fault tolerance for minimizing transmission overhead. The system parameters are carefully tuned on the basis of thorough analyses to optimize network performance. Extensive simulations are carried out for performance evaluation. Our results show that both schemes achieve a high message delivery ratio with acceptable delay. The RED scheme results in lower complexity in message and queue management, while the FAD scheme has a lower message transmission overhead.

Journal ArticleDOI
TL;DR: This work proves a lower bound on the efficiency of a distributed scheduling algorithm by first assuming that all of the traffic only uses one hop of the network and proves that the lower bound is tight in the sense that, for any fraction larger than the lowerbound, it can find a topology and an arrival rate vector within the fraction of the capacity region such that the network is unstable under a greedy scheduling policy.
Abstract: We consider the problem of distributed scheduling in wireless networks subject to simple collision constraints. We define the efficiency of a distributed scheduling algorithm to be the largest number (fraction) such that the throughput under the distributed scheduling policy is at least equal to the efficiency multiplied by the maximum throughput achievable under a centralized policy. For a general interference model, we prove a lower bound on the efficiency of a distributed scheduling algorithm by first assuming that all of the traffic only uses one hop of the network. We also prove that the lower bound is tight in the sense that, for any fraction larger than the lower bound, we can find a topology and an arrival rate vector within the fraction of the capacity region such that the network is unstable under a greedy scheduling policy. We then extend our results to a more general multihop traffic scenario and show that similar scheduling efficiency results can be established by introducing prioritization or regulators to the basic greedy scheduling algorithm

Journal ArticleDOI
TL;DR: A joint session admission control scheme for multimedia traffic that maximizes overall network revenue with quality of service (QoS) constraints over both the WLAN and the CDMA cellular networks is proposed.
Abstract: This paper considers optimizing the utilization of radio resources in a heterogeneous integrated system consisting of two different networks: a wireless local area network (WLAN) and a wideband code division multiple access (CDMA) network. We propose a joint session admission control scheme for multimedia traffic that maximizes overall network revenue with quality of service (QoS) constraints over both the WLAN and the CDMA cellular networks. The WLAN operates under the IEEE 802.11e medium access control (MAC) protocol, which supports QoS for multimedia traffic. A novel concept of effective bandwidth is used in the CDMA network to derive the unified radio resource usage, taking into account both physical layer linear minimum mean square error (LMMSE) receivers and characteristics of the packet traffic. Numerical examples illustrate that the network revenue earned in the proposed joint admission control scheme is significantly larger than that when the individual networks are optimized independently with no vertical handoff between them. The revenue gain is also significant over the scheme in which vertical handoff is supported, but admission control is not done jointly. Furthermore, we show that the optimal joint admission control policy is a randomized policy, i.e., sessions are admitted to the system with probabilities in some states

Journal ArticleDOI
TL;DR: The results presented in this paper highlight the need to design future MAC and routing protocols for wireless ad hoc and sensor networks based, not on common-range which is prevalent today, but on variable-range power control.
Abstract: In this paper, we investigate the impact of variable-range transmission power control on the physical and network connectivity, on network capacity, and on power savings in wireless multihop networks. First, using previous work by Steele (1988), we show that, for a path attenuation factor a = 2, the average range of links in a planar random network of A m2 having n nodes is ~aradicA/n1. We show that this average range is approximately half the range obtained when common-range transmission control is used. Combining this result and previous work by Gupta and Kumar (2000), we derive an expression for the average traffic carrying capacity of variable-range-based multihop networks. For a = 2, we show that this capacity remains constant even when more nodes are added to the network. Second, we derive a model that approximates the signaling overhead of a routing protocol as a function of the transmission range and node mobility for both route discovery and route maintenance. We show that there is an optimum setting for the transmission range, not necessarily the minimum, which maximizes the capacity available to nodes in the presence of node mobility. The results presented in this paper highlight the need to design future MAC and routing protocols for wireless ad hoc and sensor networks based, not on common-range which is prevalent today, but on variable-range power control

Journal ArticleDOI
My T. Thai1, Feng Wang, Dan Liu, Shiwei Zhu, Ding-Zhu Du 
TL;DR: A network is model as a disk graph and the CDS problem in disk graphs is introduced and a size relationship between a maximal independent set and a CDS as well as a bound of the maximum number of independent neighbors of a node in disks.
Abstract: Since there is no fixed infrastructure or centralized management in wireless ad hoc networks, a Connected Dominating Set (CDS) has been proposed to serve as a virtual backbone. The CDS of a graph representing a network has a significant impact on the efficient design of routing protocols in wireless networks. This problem has been studied extensively in Unit Disk Graphs (UDG), in which all nodes have the same transmission ranges. However, in practice, the transmission ranges of all nodes are not necessarily equal. In this paper, we model a network as a disk graph and introduce the CDS problem in disk graphs. We present two efficient approximation algorithms to obtain a minimum CDS. The performance ratio of these algorithms is constant if the ratio of the maximum transmission range over the minimum transmission range in the network is bounded. These algorithms can be implemented as distributed algorithms. Furthermore, we show a size relationship between a maximal independent set and a CDS as well as a bound of the maximum number of independent neighbors of a node in disk graphs. The theoretical analysis and simulation results are also presented to verify our approaches.

Journal ArticleDOI
TL;DR: In this paper, a multilayer approach for exploiting virtual MISO links in ad hoc networks is presented, which spans the physical, medium access control and routing layers, and provides a significant improvement in the end-to-end performance in terms of throughput and delay.
Abstract: Space-time communications can help combat fading and, hence, can significantly increase the capacity of ad hoc networks. Cooperative diversity or virtual antenna arrays facilitate spatio-temporal communications without actually requiring the deployment of physical antenna arrays. Virtual MISO entails the simultaneous transmission of appropriately encoded information by multiple nodes to effectively emulate a transmission on an antenna array. We present a novel multilayer approach for exploiting virtual MISO links in ad hoc networks. The approach spans the physical, medium access control and routing layers, and provides 1) a significant improvement in the end-to-end performance in terms of throughput and delay and 2) robustness to mobility and interference-induced link failures. The key physical layer property that we exploit is an increased transmission range due to achieved diversity gain. Except for space-time signal processing capabilities, our design does not require any additional hardware. We perform extensive simulations to quantify the benefits of our approach using virtual MISO links. As compared to using only SISO links, we achieve an increase of up to 150 percent in terms of the end-to-end throughput and a decrease of up to 75 percent in the incurred end-to-end delay. Our results also demonstrate a reduction in the route discovery attempts due to link failures by up to 60 percent, a direct consequence of the robustness that our approach provides to link failures

Journal ArticleDOI
TL;DR: It is shown how the sensor nodes can exploit channel diversity in order to create wormholes that lead out of the jammed region, through which an alarm can be transmitted to the network operator.
Abstract: Due to their very nature, wireless sensor networks are probably the category of wireless networks most vulnerable to “radio channel jamming”-based Denial-of-Service (DoS) attacks. An adversary can easily mask the events that the sensor network should detect by stealthily jamming an appropriate subset of the nodes; in this way, he prevents them from reporting what they are sensing to the network operator. Therefore, even if an event is sensed by one or several nodes (and the sensor network is otherwise fully connected), the network operator cannot be informed on time. We show how the sensor nodes can exploit channel diversity in order to create wormholes that lead out of the jammed region, through which an alarm can be transmitted to the network operator. We propose three solutions: The first is based on wired pairs of sensors, the second relies on frequency hopping, and the third is based on a novel concept called uncoordinated channel hopping. We develop appropriate mathematical models to study the proposed solutions.

Journal ArticleDOI
TL;DR: It is shown how the sensor nodes can exploit channel diversity in order to create wormholes that lead out of the jammed region, through which an alarm can be transmitted to the network operator.
Abstract: Due to their very nature, wireless sensor networks are probably the category of wireless networks most vulnerable to "radio channel jamming"-based denial-of-service (DoS) attacks. An adversary can easily mask the events that the sensor network should detect by stealthily jamming an appropriate subset of the nodes; in this way, he prevents them from reporting what they are sensing to the network operator. Therefore, even if an event is sensed by one or several nodes (and the sensor network is otherwise fully connected), the network operator cannot be informed on time. We show how the sensor nodes can exploit channel diversity in order to create wormholes that lead out of the jammed region, through which an alarm can be transmitted to the network operator. We propose three solutions. The first is based on wired pairs of sensors, the second relies on frequency hopping, and the third is based on a novel concept called uncoordinated channel hopping. We develop appropriate mathematical models to study the proposed solutions

Journal ArticleDOI
TL;DR: This work proposes cell breathing, a well-known concept in cellular telephony, as a load balancing mechanism to handle client congestion in a wireless LAN, and develops power management algorithms for controlling the coverage of access points to handle dynamic changes in client workloads.
Abstract: Wireless LAN administrators often have to deal with the problem of sporadic client congestion in popular locations within the network. Existing approaches that relieve congestion by balancing the traffic load are encumbered by the modifications that are required to both access points and clients. We propose cell breathing, a well-known concept in cellular telephony, as a load balancing mechanism to handle client congestion in a wireless LAN. We develop power management algorithms for controlling the coverage of access points to handle dynamic changes in client workloads. We further incorporate hand-off costs and manufacturer specified power level constraints into our algorithms. Our approach does not require modification to clients or to the standard. It only changes the transmission power of beacon packets and does not change the transmission power of data packets to avoid the interactions with auto-rating. We analyze the worst-case bounds of the algorithms and show that they are either optimal or close to optimal. In addition, we evaluate our algorithms empirically using synthetic and real wireless LAN traces. Our results show that cell breathing significantly outperforms the commonly used fixed power scheme and performs at par with sophisticated load balancing schemes that require changes to both the client and access points

Journal ArticleDOI
TL;DR: The experimental results show that, among the proposed algorithms, one algorithm that takes into account both the residual energy and the volume of data at each sensor node significantly outperforms the others.
Abstract: Energy-constrained sensor networks have been deployed widely for monitoring and surveillance purposes. Data gathering in such networks is often a prevalent operation. Since sensors have significant power constraints (battery life), energy efficient methods must be employed for data gathering to prolong network lifetime. We consider an online data gathering problem in sensor networks, which is stated as follows: assume that there is a sequence of data gathering queries, which arrive one by one. To respond to each query as it arrives, the system builds a routing tree for it. Within the tree, the volume of the data transmitted by each internal node depends on not only the volume of sensed data by the node itself, but also the volume of data received from its children. The objective is to maximize the network lifetime without any knowledge of future query arrivals and generation rates. In other words, the objective is to maximize the number of data gathering queries answered until the first node in the network fails. For the problem of concern, in this paper, we first present a generic cost model of energy consumption for data gathering queries if a routing tree is used for the query evaluation. We then show the problem to be NP-complete and propose several heuristic algorithms for it. We finally conduct experiments by simulation to evaluate the performance of the proposed algorithms in terms of network lifetime delivered. The experimental results show that, among the proposed algorithms, one algorithm that takes into account both the residual energy and the volume of data at each sensor node significantly outperforms the others

Journal ArticleDOI
TL;DR: A mathematical framework to analyze the interdependent aspects of WSN communication protocol and signal processing design is provided and it is shown that both the DDSP technique and the MAC protocol choice have a relevant impact on the performance of a WSN.
Abstract: In this paper, the estimation of a scalar field over a bidimensional scenario (e.g., the atmospheric pressure in a wide area) through a self-organizing wireless sensor network (WSN) with energy constraints is investigated. The sensor devices (denoted as nodes) are randomly distributed; they transmit samples to a supervisor by using a clustered network. This paper provides a mathematical framework to analyze the interdependent aspects of WSN communication protocol and signal processing design. Channel modelling and connectivity issues, multiple access control and routing, and the role of distributed digital signal processing (DDSP) techniques are accounted for. The possibility that nodes perform DDSP is studied through a distributed compression technique based on signal resampling. The DDSP impact on network energy efficiency is compared through a novel mathematical approach to the case where the processing is performed entirely by the supervisor. The trade-off between energy conservation (i.e., network lifetime) and estimation error is discussed and a design criterion is proposed as well. Comparison to simulation outcomes validates the model. As an example result, the required node density is found as a trade-off between estimation quality and network lifetime for different system parameters and scalar field characteristics. It is shown that both the DDSP technique and the MAC protocol choice have a relevant impact on the performance of a WSN.

Journal ArticleDOI
TL;DR: The simulation results show that, when combining the APA and CAC optimization methods together, the proposed resource management framework can meet the expectations of both service providers and subscribers.
Abstract: In this paper, we propose a novel downlink resource management framework for multiservice WiMAX (worldwide interoperability for microwave access) networks. Our framework consists of two major components: adaptive power allocation (APA) and call admission control (CAC). We formulate each of them as an optimization problem, where the demands of both WiMAX service providers and subscribers are taken into account. To solve the optimization problems, we develop a fairness-constrained greedy revenue algorithm for downlink APA optimization and a utility-constrained greedy approximation algorithm for downlink CAC optimization. Our simulation results show that, when combining the APA and CAC optimization methods together, the proposed resource management framework can meet the expectations of both service providers and subscribers

Journal ArticleDOI
TL;DR: The UCAN architecture can increase individual user's throughput by more than 100 percent and the aggregate throughput of the HDR downlink by up to 50 percent and secure crediting mechanisms to motivate users that are not actively receiving to participate in relaying packets for others are proposed.
Abstract: In third-generation (3G) wireless data networks, providing service to low data-rate users is required for maintaining fairness, but at the cost of reducing the cell's aggregate throughput. In this paper, we propose the unified cellular and ad hoc network (UCAN) architecture for enhancing cell throughput while maintaining fairness. In UCAN, a mobile client has both 3G interface and IEEE 802.11 -based peer-to-peer links. The 3G base station forwards packets for destination clients with poor channel quality to proxy clients with better channel quality. The proxy clients then use an ad hoc network composed of other mobile clients and IEEE 802.11 wireless links to forward the packets to the appropriate destinations, thereby improving cell throughput. We refine the 3G base station scheduling algorithm so that the throughput gains are distributed in proportion to users' average channel rates, thereby maintaining fairness. With the UCAN architecture in place, we propose novel greedy and on-demand protocols for proxy discovery and ad hoc routing that explicitly leverage the existence of the 3G infrastructure to reduce complexity and improve reliability. We further propose secure crediting mechanisms to motivate users that are not actively receiving to participate in relaying packets for others. Through both analysis and extensive simulations with HDR and IEEE 802.11b, we show that the UCAN architecture can increase individual user's throughput by more than 100 percent and the aggregate throughput of the HDR downlink by up to 50 percent.

Journal ArticleDOI
TL;DR: This work proposes a novel model of service provisioning in ad hoc networks based on the concept of context- aware migratory services, and built TJam, a proof-of-concept migratory service that predicts traffic jams in a given region of a highway by using only car-to-car short-range wireless communication.
Abstract: Ad hoc networks can be used not only as data carriers for mobile devices but also as providers of a new class of services specific to ubiquitous computing environments. Building services in ad hoc networks, however, is challenging due to the rapidly changing operating contexts, which often lead to situations where a node hosting a certain service becomes unsuitable for hosting the service execution any longer. We propose a novel model of service provisioning in ad hoc networks based on the concept of context- aware migratory services. Unlike a regular service that executes always on the same node, a migratory service can migrate to different nodes in the network in order to accomplish its task. The migration is triggered by changes of the operating context, and it occurs transparently to the client application. We designed and implemented a framework for developing migratory services. We built TJam, a proof-of-concept migratory service that predicts traffic jams in a given region of a highway by using only car-to-car short-range wireless communication. The experimental results obtained over an ad hoc network of personal digital assistants (PDAs) show the effectiveness of our approach in the presence of frequent disconnections. We also present simulation results that demonstrate the benefits of migratory services in large-scale networks compared to a statically centralized approach.