scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Transactions on Mobile Computing in 2008"


Journal ArticleDOI
TL;DR: A scalable architecture for protecting the location privacy from various privacy threats resulting from uncontrolled usage of LBSs is described, including the development of a personalized location anonymization model and a suite of location perturbation algorithms.
Abstract: Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency response, location-based advertisement, and location-based entertainment. An important challenge in the wide deployment of location-based services (LBSs) is the privacy-aware management of location information, providing safeguards for location privacy of mobile clients against vulnerabilities for abuse. This paper describes a scalable architecture for protecting the location privacy from various privacy threats resulting from uncontrolled usage of LBSs. This architecture includes the development of a personalized location anonymization model and a suite of location perturbation algorithms. A unique characteristic of our location privacy architecture is the use of a flexible privacy personalization framework to support location k-anonymity for a wide range of mobile clients with context-sensitive privacy requirements. This framework enables each mobile client to specify the minimum level of anonymity that it desires and the maximum temporal and spatial tolerances that it is willing to accept when requesting k-anonymity-preserving LBSs. We devise an efficient message perturbation engine to implement the proposed location privacy framework. The prototype that we develop is designed to be run by the anonymity server on a trusted platform and performs location anonymization on LBS request messages of mobile clients such as identity removal and spatio-temporal cloaking of the location information. We study the effectiveness of our location cloaking algorithms under various conditions by using realistic location data that is synthetically generated from real road maps and traffic volume data. Our experiments show that the personalized location k-anonymity model, together with our location perturbation engine, can achieve high resilience to location privacy threats without introducing any significant performance penalty.

883 citations


Journal ArticleDOI
TL;DR: This work develops a sensing-period optimization mechanism and an optimal channel-sequencing algorithm, as well as an environment- adaptive channel-usage pattern estimation method that is shown to track time-varying channel-parameters accurately.
Abstract: Sensing/monitoring of spectrum-availability has been identified as a key requirement for dynamic spectrum allocation in cognitive radio networks (CRNs). An important issue associated with MAC-layer sensing in CRNs is how often to sense the availability of licensed channels and in which order to sense those channels. To resolve this issue, we address (1) how to maximize the discovery of spectrum opportunities by sensing-period adaptation and (2) how to minimize the delay in finding an available channel. Specifically, we develop a sensing-period optimization mechanism and an optimal channel-sequencing algorithm, as well as an environment- adaptive channel-usage pattern estimation method. Our simulation results demonstrate the efficacy of the proposed schemes and its significant performance improvement over nonoptimal schemes. The sensing-period optimization discovers more than 98 percent of the analytical maximum of discoverable spectrum-opportunities, regardless of the number of channels sensed. For the scenarios tested, the proposed scheme is shown to discover up to 22 percent more opportunities than nonoptimal schemes, which may become even greater with a proper choice of initial sensing periods. The idle-channel discovery delay with the optimal channel-sequencing technique ranges from 0.08 to 0.35 seconds under the tested scenarios, which is much faster than nonoptimal schemes. Moreover, our estimation method is shown to track time-varying channel-parameters accurately.

856 citations


Journal ArticleDOI
TL;DR: This paper compares, through analysis and simulation, a number of multichannel MAC protocols and concludes that parallel rendezvous protocols generally perform better than single Rendezvous protocols.
Abstract: This paper compares, through analysis and simulation, a number of multichannel MAC protocols. We first classify these protocols into four categories based on their principles of operation: dedicated control channel, common hopping, split phase, and parallel rendezvous protocols. We then examine the effects of the number of channels and devices, channel switching times, and traffic patterns on the throughput and delay of the protocols. Here are some of the conclusions of our study: (1) parallel rendezvous protocols generally perform better than single rendezvous protocols, (2) the dedicated control channel protocol can be a good approach with its simplicity when the number of channels is high and the packets are long, and (3) the split phase protocol is very sensitive to the durations of the control and data phases. Our study focuses on a single collision domain.

399 citations


Journal ArticleDOI
TL;DR: This paper designs centralized and distributed algorithms for the problem of assigning channels to communication links in the network with the objective of minimizing the overall network interference, and develops a semidefinite program and a linear program formulation of the optimization problem to obtain lower bounds onOverall network interference.
Abstract: In this paper, we consider multihop wireless mesh networks, where each router node is equipped with multiple radio interfaces, and multiple channels are available for communication. We address the problem of assigning channels to communication links in the network with the objective of minimizing the overall network interference. Since the number of radios on any node can be less than the number of available channels, the channel assignment must obey the constraint that the number of different channels assigned to the links incident on any node is at most the number of radio interfaces on that node. The above optimization problem is known to be NP-hard. We design centralized and distributed algorithms for the above channel assignment problem. To evaluate the quality of the solutions obtained by our algorithms, we develop a semidefinite program and a linear program formulation of our optimization problem to obtain lower bounds on overall network interference. Empirical evaluations on randomly generated network graphs show that our algorithms perform close to the above established lower bounds, with the difference diminishing rapidly with increase in number of radios. Also, ns-2 simulations, as well as experimental studies on testbed, demonstrate the performance potential of our channel assignment algorithms in 802.11-based multiradio mesh networks.

380 citations


Journal ArticleDOI
TL;DR: This paper presents a comprehensive analysis on the maximum achievable sensor network lifetime for different deployment strategies, and it also provides practical cost-efficient sensor network deployment guidelines.
Abstract: In multihop wireless sensor networks that are often characterized by many-to-one (convergecast) traffic patterns, problems related to energy imbalance among sensors often appear. Sensors closer to a data sink are usually required to forward a large amount of traffic for sensors farther from the data sink. Therefore, these sensors tend to die early, leaving areas of the network completely unmonitored and reducing the functional network lifetime. In our study, we explore possible sensor network deployment strategies that maximize sensor network lifetime by mitigating the problem of the hot spot around the data sink. Strategies such as variable-range transmission power control with optimal traffic distribution, mobile-data-sink deployment, multiple-data-sink deployment, nonuniform initial energy assignment, and intelligent sensor/relay deployment are investigated. We suggest a general model to analyze and evaluate these strategies. In this model, we not only discover how to maximize the network lifetime given certain network constraints but also consider the factor of extra costs involved in more complex deployment strategies. This paper presents a comprehensive analysis on the maximum achievable sensor network lifetime for different deployment strategies, and it also provides practical cost-efficient sensor network deployment guidelines.

271 citations


Journal ArticleDOI
TL;DR: A MAC protocol, called Opportunistic Spectrum MAC (OS-MAC), is proposed, which adaptively and dynamically seeks and exploits opportunities in both licensed and unlicensed spectra and along both the time and the frequency dimensions, and is shown to be far more effective than current access protocols from both the network's and the user's perspectives.
Abstract: Wireless networks and devices have been rapidly gaining popularity over their wired counterparts. This popularity, in turn, has been generating an explosive and ever-increasing demand for, and hence creating a shortage of, the radio spectrum. Existing studies indicate that this foreseen spectrum shortage is not so much due to the scarcity of the radio spectrum, but due to the inefficiency of current spectrum access methods, thus leaving spectrum opportunities along both the time and the frequency dimensions that wireless devices can exploit. Fortunately, recent technological advances have made it possible to build software-defined radios (SDRs) which, unlike traditional radios, can switch from one frequency band to another at little or no cost. We propose a MAC protocol, called Opportunistic Spectrum MAC (OS-MAC), for wireless networks equipped with cognitive radios like SDRs. OS-MAC (1) adaptively and dynamically seeks and exploits opportunities in both licensed and unlicensed spectra and along both the time and the frequency dimensions; (2) accesses and shares spectrum among different unlicensed and licensed users; and (3) coordinates with other unlicensed users for better spectrum utilization. Using extensive simulation, OS-MAC is shown to be far more effective than current access protocols from both the network's and the user's perspectives. By comparing its performance with an Ideal-MAC protocol, OS-MAC is also shown to not only outperform current access protocols, but also achieve performance very close to that obtainable under the Ideal-MAC protocol.

221 citations


Journal ArticleDOI
TL;DR: This paper presents a novel algorithm, known as LEMT (Location Estimation using Model Trees), to reconstruct a radio map using real-time signal- strength readings received at the reference points, which can effectively accommodate the variations of signal strength over different time periods without the need to rebuild the radio maps repeatedly.
Abstract: In wireless networks, a client's locations can be estimated using the signals received from various signal transmitters. Static fingerprint-based techniques are commonly used for location estimation, in which a radio map is built by calibrating signal-strength values in the offline phase. These values, compiled into deterministic or probabilistic models, are used for online localization. However, the radio map can be outdated when the signal-strength values change with time due to environmental dynamics, and repeated data calibration is infeasible or expensive. In this paper, we present a novel algorithm, known as LEMT (Location Estimation using Model Trees), to reconstruct a radio map using real-time signal- strength readings received at the reference points. This algorithm can take into account real-time signal-strength values at each time point and make use of the dependency between the estimated locations and reference points. We show that this technique can effectively accommodate the variations of signal strength over different time periods without the need to rebuild the radio maps repeatedly. We demonstrate the effectiveness of our proposed technique on realistic data sets collected from an 802.11b wireless network and a RFID-based network.

220 citations


Journal ArticleDOI
TL;DR: The solution to the placement problem allows an arbitrary-shaped sensing field possibly with arbitrary- shaped obstacles and an arbitrary relationship between the communication distance and sensing distance of sensors and, thus, significantly relaxes the limitations of existing results.
Abstract: Sensor deployment is a critical issue because it affects the cost and detection capability of a wireless sensor network. In this work, we consider two related deployment problems: sensor placement and sensor dispatch. The former asks how to place the least number of sensors in a field to achieve sensing coverage and network connectivity, and the latter asks how to determine from a set of mobile sensors a subset of sensors to be moved to an area of interest with certain objective functions such that the coverage and connectivity properties are satisfied. This work is targeted toward planned deployment. Our solution to the placement problem allows an arbitrary-shaped sensing field possibly with arbitrary-shaped obstacles and an arbitrary relationship between the communication distance and sensing distance of sensors and, thus, significantly relaxes the limitations of existing results. Our solutions to the dispatch problem include a centralized one and a distributed one. The centralized one is based on adopting the former placement results and converting the problem to the maximum-weight maximum-matching problem with the objective of minimizing the total energy consumption to move sensors or maximizing the average remaining energy of sensors after movement. Designed in a similar way, the distributed one allows sensors to determine their moving directions in an autonomous manner.

215 citations


Journal ArticleDOI
TL;DR: The design of the rendezvous-based data collection protocol that facilitates reliable data transfers from RPs to MEs in presence of significant unexpected delays in ME movement and network communication is designed.
Abstract: Recent research shows that significant energy saving can be achieved in wireless sensor networks by using mobile elements (MEs) capable of carrying data mechanically. However, the low movement speed of MEs hinders their use in data-intensive sensing applications with temporal constraints. To address this issue, we propose a rendezvous-based approach in which a subset of nodes serve as the rendezvous points (RPs) that buffer data originated from sources and transfer to MEs when they arrive. RPs enable MEs to collect a large volume of data at a time without traveling long distances, which can achieve a desirable balance between network energy saving and data collection delay. We develop two rendezvous planning algorithms, RP-CP and RP-UG. RP-CP finds the optimal RPs when MEs move along the data routing tree while RP-UG greedily chooses the RPs with maximum energy saving to travel distance ratios. We design the rendezvous-based data collection protocol that facilitates reliable data transfers from RPs to MEs in presence of significant unexpected delays in ME movement and network communication. Our approach is validated through extensive simulations.

206 citations


Journal ArticleDOI
Yun Wang1, Xiaodong Wang1, Bin Xie1, Demin Wang1, Dharma P. Agrawal1 
TL;DR: This paper derives the detection probability of intrusion detection in Wireless Sensor Network according to two WSN models: homogeneous and heterogeneous WSN, and discusses the network connectivity and broadcast reachability, which are necessary conditions to ensure the corresponding detection probability in a WSN.
Abstract: Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. For this purpose, it is a fundamental issue to characterize the WSN parameters such as node density and sensing range in terms of a desirable detection probability. In this paper, we consider this issue according to two WSN models: homogeneous and heterogeneous WSN. Furthermore, we derive the detection probability by considering two sensing models: single-sensing detection and multiple-sensing detection. In addition, we discuss the network connectivity and broadcast reachability, which are necessary conditions to ensure the corresponding detection probability in a WSN. Our simulation results validate the analytical values for both homogeneous and heterogeneous WSNs.

205 citations


Journal ArticleDOI
TL;DR: An improved mechanism to estimate the available bandwidth in IEEE 802.11-based ad hoc networks is proposed and the accuracy of the estimation is compared to the estimation performed by other state-of-the-art CoS protocols, BRulT, AAC, and CoS-AODV.
Abstract: Since 2005, IEEE 802.11-based networks have been able to provide a certain level of quality of service (QoS) by the means of service differentiation, due to the IEEE 802.11e amendment. However, no mechanism or method has been standardized to accurately evaluate the amount of resources remaining on a given channel. Such an evaluation would, however, be a good asset for bandwidth-constrained applications. In multihop ad hoc networks, such evaluation becomes even more difficult. Consequently, despite the various contributions around this research topic, the estimation of the available bandwidth still represents one of the main issues in this field. In this paper, we propose an improved mechanism to estimate the available bandwidth in IEEE 802.11-based ad hoc networks. Through simulations, we compare the accuracy of the estimation we propose to the estimation performed by other state-of-the-art CoS protocols, BRulT, AAC, and CoS-AODV.

Journal ArticleDOI
TL;DR: This work proposes an interference- minimized multipath routing (I2MR) protocol that increases throughput by discovering zone-disjoint paths for load balancing, requiring minimal localization support and proposes a congestion control scheme that further increased throughput by loading the paths forload balancing at the highest possible rate supportable.
Abstract: High-rate streaming in WSN is required for future applications to provide high-quality information of battlefield hot spots. Although recent advances have enabled large-scale WSN to be deployed supported by high-bandwidth backbone network for high-rate streaming, the WSN remains the bottleneck due to the low-rate radios used and the effects of wireless interferences. First, we propose a technique to evaluate the quality of a pathset for multipath load balancing, taking into consideration the effects of wireless interferences and that nodes may interfere beyond communication ranges. Second, we propose an interference- minimized multipath routing (I2MR) protocol that increases throughput by discovering zone-disjoint paths for load balancing, requiring minimal localization support. Third, we propose a congestion control scheme that further increases throughput by loading the paths for load balancing at the highest possible rate supportable. Finally, we validate thepath-set evaluation technique and also evaluate the I2MR protocol and congestion control scheme by comparing with AODV protocol and node-disjoint multipath routing (NDMR) protocol. Simulation results show that I2MR with congestion control achieves on average 230% and 150% gains in throughput over AODV and NDMR respectively, and consumes comparable or at most 24% more energy than AODV but up to 60% less energy than NDMR.

Journal ArticleDOI
TL;DR: The results of this experiment show that the proposed localization scheme that just uses two signal paths, is able to outperform the existing localization schemes in both LOS and extreme NLOS situations where all reference devices are in NLOS with the mobile device.
Abstract: This paper presents a comprehensive Non Line of Sight (NLOS) localization scheme and a least square estimator that leverages on the bi-directional estimation of the Angle of Arrival (AOA) and Time of Arrival (TOA) of signals exchanged between mobile and reference devices The proposed localization scheme requires two or more signal paths which can be either Line of Sight (LOS) signals or Non-line of Sight (NLOS) multipath signals that undergo one bound scattering Our multipath selection scheme is shown to be able to discard multiple bound scattering paths with a high degree accuracy We used empirical data obtained through experimentation in a real environment to analyse the performance of our proposed localization scheme, and to compare it to the existing methods The results of this experiment show that the proposed localization scheme that just uses two signal paths, is able to outperform the existing localization schemes in both LOS and extreme NLOS situations where all reference devices are in NLOS with the mobile device This localization approach is very useful in multipath environments where it may not always be possible to have at least three reference devices in LOS with the mobile device

Journal ArticleDOI
TL;DR: An analytical framework for the coverage and lifetime of a WSN that follows a two-dimensional Gaussian distribution is provided and intrinsic properties of coverage/lifetime are identified in terms ofGaussian distribution parameters, which is a fundamental issue in designing a W SN.
Abstract: A wireless sensor network (WSN) has to maintain a desirable sensing coverage and periodically report sensed data to the administrative center (i.e., base station) and the reporting period may range from months to years. Coverage and lifetime are two paramount problems in a WSN due to constraint of associated battery power. All previous theoretical analysis on the coverage and lifetime is primarily focused on the random uniform distribution of sensors or some specific network scenarios (e.g., a controllable WSN). In this paper, we provide an analytical framework for the coverage and lifetime of a WSN that follows a two-dimensional Gaussian distribution. We also study the coverage and lifetime when the dimensions of Gaussian dispersion (i.e., x, y) admit different Gaussian parameters (i.e., standard deviation, sigmaxnesigmay). We identify intrinsic properties of coverage/lifetime in terms of Gaussian distribution parameters, which is a fundamental issue in designing a WSN. Following the results obtained, we further determine the sensor deployment strategies for a WSN that could satisfy a predefined coverage and lifetime. Two deployment algorithms are developed based on using our analytical models and are shown to effectively increase the WSN lifetime.

Journal ArticleDOI
TL;DR: It is shown that the standard 802.11 technology is not scalable because, due to EN, more APs do not yield higher total throughput, and schemes to eliminate EN and HN are provided, respectively.
Abstract: Two well-known problems that can cause performance degradations in IEEE 802.11 wireless networks are the exposed-node (EN) and hidden-node (HN) problems. Although there have been isolated and incidental studies of EN and HN, a comprehensive treatment has not been attempted. The contributions of this paper are threefold: First, we provide rigorous mathematical definitions for EN and HN in wireless networks (including wireless local area networks (WLANs) with multiple access points (APs) and ad hoc networks). Second, we relate EN to the nonscalability of network throughput and HN to unfair throughput distributions. Third, we provide schemes to eliminate EN and HN, respectively. We show that the standard 802.11 technology is not scalable because, due to EN, more APs do not yield higher total throughput. By removing EN, our schemes make it possible to achieve scalable throughput commensurate with the seminal theoretical results in [1] and [2]. In addition, by removing HN, our schemes solve the performance problems triggered by HN, including throughput unfairness/starvation and rerouting instability.

Journal ArticleDOI
TL;DR: A game-theoretic framework for radio resource management in such a heterogeneous wireless access environment is presented and an admission control is used to limit the number of ongoing connections so that the QoS performances are maintained at the target level for the different types of connections.
Abstract: Fourth generation (4G) wireless networks will provide high-bandwidth connectivity with quality-of-service (QoS) support to mobile users in a seamless manner. In such a scenario, a mobile user will be able to connect to different wireless access networks such as a wireless metropolitan area network (WMAN), a cellular network, and a wireless local area network (WLAN) simultaneously. We present a game-theoretic framework for radio resource management (that is, bandwidth allocation and admission control) in such a heterogeneous wireless access environment. First, a noncooperative game is used to obtain the bandwidth allocations to a service area from the different access networks available in that service area (on a long-term basis). The Nash equilibrium for this game gives the optimal allocation which maximizes the utilities of all the connections in the network (that is, in all of the service areas). Second, based on the obtained bandwidth allocation, to prioritize vertical and horizontal handoff connections over new connections, a bargaining game is formulated to obtain the capacity reservation thresholds so that the connection-level QoS requirements can be satisfied for the different types of connections (on a long-term basis). Third, we formulate a noncooperative game to obtain the amount of bandwidth allocated to an arriving connection (in a service area) by the different access networks (on a short-term basis). Based on the allocated bandwidth and the capacity reservation thresholds, an admission control is used to limit the number of ongoing connections so that the QoS performances are maintained at the target level for the different types of connections.

Journal ArticleDOI
TL;DR: This article presents a polynomial-time centralized approximation algorithm that provably delivers a solution whose benefit is at least 1/4 (1/2 for uniform-size data items) of the optimal benefit of the cache placement problem of minimizing total data access cost in ad hoc networks with multiple data items and nodes with limited memory capacity.
Abstract: Data caching can significantly improve the efficiency of information access in a wireless ad hoc network by reducing the access latency and bandwidth usage. However, designing efficient distributed caching algorithms is nontrivial when network nodes have limited memory. In this article, we consider the cache placement problem of minimizing total data access cost in ad hoc networks with multiple data items and nodes with limited memory capacity. The above optimization problem is known to be NP-hard. Defining benefit as the reduction in total access cost, we present a polynomial-time centralized approximation algorithm that provably delivers a solution whose benefit is at least 1/4 (1/2 for uniform-size data items) of the optimal benefit. The approximation algorithm is amenable to localized distributed implementation, which is shown via simulations to perform close to the approximation algorithm. Our distributed algorithm naturally extends to networks with mobile nodes. We simulate our distributed algorithm using a network simulator (ns2) and demonstrate that it significantly outperforms another existing caching technique (by Yin and Cao [33]) in all important performance metrics. The performance differential is particularly large in more challenging scenarios such as higher access frequency and smaller memory.

Journal ArticleDOI
TL;DR: Through extensive systematic simulations and a representative set of real mote experiments, this work shows that the lightweight localization technique provides comparable or better accuracy than other state-of-the-art radio signal strength-based localization techniques over a range of wireless channel and node deployment conditions.
Abstract: We introduce a novel sequence-based localization technique for wireless sensor networks. We show that the localization space can be divided into distinct regions that can each be uniquely identified by sequences that represent the ranking of distances from the reference nodes to that region. For n reference nodes in the localization space, combinatorially, O(n") sequences are possible, but we show that, due to geometric constraints, the actual number of feasible location sequences is much lower: only O(n 4). Using these location sequences, we develop a localization technique that is robust to random errors due to the multipath and shadowing effects of wireless channels. Through extensive systematic simulations and a representative set of real mote experiments, we show that our lightweight localization technique provides comparable or better accuracy than other state-of-the-art radio signal strength-based localization techniques over a range of wireless channel and node deployment conditions.

Journal ArticleDOI
TL;DR: A location-aware end-to-end security framework in which secret keys are bound to geographic locations and each node stores a few keys based on its own location, which effectively limits the impact of compromised nodes only to their vicinity without affecting end- to-end data security.
Abstract: Providing desirable data security, that is, confidentiality, authenticity, and availability, in wireless sensor networks (WSNs) is challenging, as a WSN usually consists of a large number of resource constraint sensor nodes that are generally deployed in unattended/hostile environments and, hence, are exposed to many types of severe insider attacks due to node compromise. Existing security designs mostly provide a hop-by-hop security paradigm and thus are vulnerable to such attacks. Furthermore, existing security designs are also vulnerable to many types of denial of service (DoS) attacks, such as report disruption attacks and selective forwarding attacks and thus put data availability at stake. In this paper, we seek to overcome these vulnerabilities for large-scale static WSNs. We come up with a location-aware end-to-end security framework in which secret keys are bound to geographic locations and each node stores a few keys based on its own location. This location-aware property effectively limits the impact of compromised nodes only to their vicinity without affecting end-to-end data security. The proposed multifunctional key management framework assures both node-to-sink and node-to-node authentication along the report forwarding routes. Moreover, the proposed data delivery approach guarantees efficient en-route bogus data filtering and is highly robust against DoS attacks. The evaluation demonstrates that the proposed design is highly resilient against an increasing number of compromised nodes and effective in energy savings.

Journal ArticleDOI
TL;DR: This work proposes and analyze a new approach for securing localization and location verification in wireless networks based on hidden and mobile base stations that enables secure localization with a broad spectrum of localization techniques, ultrasonic or radio, based on the received signal strength or signal time of flight.
Abstract: In this work, we propose and analyze a new approach for securing localization and location verification in wireless networks based on hidden and mobile base stations. Our approach enables secure localization with a broad spectrum of localization techniques, ultrasonic or radio, based on the received signal strength or signal time of flight. Through several examples, we show how this approach can be used to secure node-centric and infrastructure-centric localization schemes. We further show how this approach can be applied to secure localization in mobile ad hoc and sensor networks.

Journal ArticleDOI
TL;DR: This work proposes several localized sensor area coverage protocols for heterogeneous sensors, each with arbitrary sensing and transmission radii, and has shown robustness in a model with collisions and/or a realistic physical layer.
Abstract: We propose several localized sensor area coverage protocols for heterogeneous sensors, each with arbitrary sensing and transmission radii. The approach has a very small communication overhead since prior knowledge about neighbor existence is not required. Each node selects a random time out and listens to messages sent by other nodes before the time out expires. Sensor nodes whose sensing area is not fully covered (or fully covered but with a disconnected set of active sensors) when the deadline expires decide to remain active for the considered round and transmit an activity message announcing it. There are four variants in our approach, depending on whether or not withdrawal and retreat messages are transmitted. Covered nodes decide to sleep, with or without transmitting a withdrawal message to inform neighbors about the status. After hearing from more neighbors, active sensors may observe that they became covered and may decide to alter their original decision and transmit a retreat message. Our simulations show a largely reduced message overhead while preserving coverage quality for the ideal MAC/physical layer. Compared to an existing method (based on hello messages followed by retreat ones and where excessive message loss contributed to excessive coverage holes), our approach has shown robustness in a model with collisions and/or a realistic physical layer.

Journal ArticleDOI
TL;DR: This work presents a fully distributed range-free localization scheme for WSNs that assumes that only a few sensor nodes, called anchors, know their locations, and the remaining (normal) nodes need to estimate their own locations by gathering nearby neighboring information.
Abstract: Localization is a fundamental and essential issue for wireless sensor networks (WSNs). Existing localization algorithms can be categorized as either range-based or range-free schemes. Range-based schemes are not suitable for WSNs because of their irregularity of radio propagation and their cost of additional devices. In contrast, range-free schemes do not need to use received signal strength to estimate distances and only need simple and cheap hardware, and are thus more suitable for WSNs. However, existing range-free schemes are too costly and not accurate enough or are not scalable. To improve previous work, we present a fully distributed range-free localization scheme for WSNs. We assume that only a few sensor nodes, called anchors, know their locations, and the remaining (normal) nodes need to estimate their own locations by gathering nearby neighboring information. We propose an improved grid-scan algorithm to find the estimated locations of the normal nodes. Furthermore, we derive a vector-based refinement scheme to improve the accuracy of the estimated locations. Analysis, simulation, and experiment results show that our scheme outperforms the other range-free schemes even when the communication radius is irregular.

Journal ArticleDOI
TL;DR: This paper argues that an accurate analysis of the effect of hidden nodes in the performance of a random access protocol is still an open issue, and proposes a novel method of modelling time that uses a fixed-length channel slot as the unit of time and does not rely on renewal theory.
Abstract: Recently research interest in the performance analysis of wireless networks was revived. An issue of an utmost importance in this class of networks, classified as one of the severest reasons for the degradation of their performance, is the hidden terminal problem. In this paper we argue that an accurate analysis of the effect of hidden nodes in the performance of a random access protocol is still an open issue. Firstly, we thoroughly explain the reasons behind the limitations of previous modelling methods, and show that their performance is reliable only for certain configurations. Secondly, and most importantly, we propose a novel method of modelling time that uses a fixed-length channel slot as the unit of time and does not rely on renewal theory. With these features the model is able to successfully take into account the desynchronisation of nodes in a hidden terminal environment. Our analytical model is shown to have a very close match to simulation results for an IEEE 802.11 MAC protocol and for all the system parameters considered, unlike conventional methods.

Journal ArticleDOI
TL;DR: This paper presents a proposed time fair CSMA (TFCSMA) which utilizes an interesting baseline property for estimating a target throughput for each competing station so that its minimum contention window could be adjusted in a distributed manner and is ideally suited for practical scenarios where stations frequently adapt their data rates to changing channel conditions.
Abstract: Under a multirate network scenario, the IEEE 802.11 DCF MAC fails to provide airtime fairness for all competing stations since the protocol is designed for ensuring max-min throughput fairness. As such, the maximum achievable throughput by any station gets bounded by the slowest transmitting peer. In this paper, we present an analytical model to study the delay and throughput characteristics of such networks so that the rate anomaly problem of IEEE DCF multirate networks could be mitigated. We call our proposal time fair CSMA (TFCSMA) which utilizes an interesting baseline property for estimating a target throughput for each competing station so that its minimum contention window could be adjusted in a distributed manner. As opposed to the previous work in this area, TFCSMA is ideally suited for practical scenarios where stations frequently adapt their data rates to changing channel conditions. In addition, TFCSMA also accounts for packet errors due to the time varying properties of the wireless channel. We thoroughly compare the performance of our proposed protocol with IEEE 802.11 and other existing protocols under different network scenarios and traffic conditions. Our comprehensive simulations validate the efficacy of our method toward providing high throughput and time fair channel allocation.

Journal ArticleDOI
TL;DR: A novel general handoff decision algorithm, GHO, is proposed to trigger HHO and VHO in heterogeneous wireless networks and analysis shows that GHO can achieve better performance than E-HY and E-DW.
Abstract: In heterogeneous wireless networks, handoff can be separated into two parts: horizontal handoff (HHO) and vertical handoff (VHO). VHO plays an important role to fulfill seamless data transfer when mobile nodes cross wireless access networks with different link layer technologies. Current VHO algorithms mainly focus on when to trigger VHO, but neglect the problem of how to synthetically consider all currently available networks (homogeneous or heterogeneous) and choose the optimal network for HHO or VHO from all the available candidates. In this paper, we present an analytical framework to evaluate VHO algorithms. Subsequently, we extend the traditional hysteresis based and dwelling-timer based algorithms to support both VHO and HHO decisions and apply them to complex heterogeneous wireless environments. We refer to these enhanced algorithms as E-HY and E-DW, respectively. Based on the proposed analytical model, we provide a formalization definition of the handoff conditions in E-HY and E-DW and analyze their performance. Subsequently, we propose a novel general handoff decision algorithm, GHO, to trigger HHO and VHO in heterogeneous wireless networks. Analysis shows that GHO can achieve better performance than E-HY and E-DW. Simulations validate the analytical results and verify that GHO outperforms traditional algorithms in terms of the matching ratio, TCP throughput and UDP throughput.

Journal ArticleDOI
TL;DR: A new Medium Access Control (MAC) protocol for full exploitation of directional antennas in wireless networks is proposed, which introduces a circular directional transmission of the Request To Send (RTS) control packet, spreading around a station information about the intended communication.
Abstract: In this paper, we propose a new Medium Access Control (MAC) protocol for full exploitation of directional antennas in wireless networks. The protocol introduces a circular directional transmission of the Request To Send (RTS) control packet, spreading around a station information about the intended communication. The stations that receive the directional RTS, using a simple scheme of tracking the neighbors' directions, defer their transmission toward the beams that could harm the ongoing communication. In this way, the proposed protocol takes advantage of the benefits of directional transmissions as the increase of spatial reuse and of coverage range. Additionally, it reduces the hidden-terminal problem, as well as the deafness problem, two main factors for the decrease of the efficiency of directional transmissions in ad hoc networks. The performance evaluation of the protocol shows that it offers a significant improvement in static, as well as mobile, scenarios, as compared to the performance of the proposed protocols that use omnidirectional or directional transmissions.

Journal ArticleDOI
TL;DR: It is shown that even when the nodes have complete information about the network, the steady-state topologies are suboptimal, and a modified algorithm is proposed based on a better response dynamic that is guaranteed to converge to energy-efficient and connected topologies.
Abstract: The problem of topology control is to assign per-node transmission power such that the resulting topology is energy efficient and satisfies certain global properties such as connectivity. The conventional approach to achieve these objectives is based on the fundamental assumption that nodes are socially responsible. We examine the following question: if nodes behave in a selfish manner, how does it impact the overall connectivity and energy consumption in the resulting topologies? We pose the above problem as a noncooperative game and use game-theoretic analysis to address it. We study Nash equilibrium properties of the topology control game and evaluate the efficiency of the induced topology when nodes employ a greedy best response algorithm. We show that even when the nodes have complete information about the network, the steady-state topologies are suboptimal. We propose a modified algorithm based on a better response dynamic and show that this algorithm is guaranteed to converge to energy-efficient and connected topologies. Moreover, the node transmit power levels are more evenly distributed, and the network performance is comparable to that obtained from centralized algorithms.

Journal ArticleDOI
TL;DR: This paper presents a range-free position determination (localization) mechanism for sensors in a three-dimensional wireless sensor network based on the use of flying anchors that outperforms both Centroid and Constraint in terms of a higher location accuracy, a reduced localization time, and a lower beacon overhead.
Abstract: This paper presents a range-free position determination (localization) mechanism for sensors in a three-dimensional wireless sensor network based on the use of flying anchors. In the scheme, each anchor is equipped with a Global Positioning System (GPS) receiver and broadcasts its location information as it flies through the sensing space. Each sensor node in the sensing area then estimates its own location by applying basic geometry principles to the location information it receives from the flying anchors. The scheme eliminates the requirement for specific positioning hardware, avoids the need for any interaction between the individual sensor nodes, and is independent of network densities and topologies. The performance of the localization scheme is evaluated in a series of simulations performed using ns-2 software and is compared to that of the Centroid and Constraint range-free mechanisms. The simulation results demonstrate that the localization scheme outperforms both Centroid and Constraint in terms of a higher location accuracy, a reduced localization time, and a lower beacon overhead. In addition, the localization scheme is implemented on the Tmote Sky for validating the feasibility in the real environment.

Journal ArticleDOI
TL;DR: The model is successfully validated by means of comparing the Markov model results with those of system-level simulations, and the flexibility exhibited by the presented model enables to extend these RAT selection policies to others responding to diverse criteria.
Abstract: This paper addresses the problem of radio access technology (RAT) selection in heterogeneous multi-access/multi-service scenarios. For such purpose, a Markov model is proposed to compare the performance of various RAT selection policies within these scenarios. The novelty of the approach resides in the embedded definition of the aforementioned RAT selection policies within the Markov chain. In addition, the model also considers the constraints imposed by those users with terminals that only support a subset of all the available RATs (i.e. multi-mode terminal capabilities). Furthermore, several performance metrics may be measured to evaluate the behaviour of the proposed RAT selection policies under varying offered traffic conditions. In order to illustrate the validation and suitability of the proposed model, some examples of operative radio access networks are provided, including the GSM/EDGE Radio Access Network (GERAN) and the UMTS Radio Access Network (UTRAN), as well as several service-based, load-balancing and terminal-driven RAT selection strategies. The flexibility exhibited by the presented model enables to extend these RAT selection policies to others responding to diverse criteria. The model is successfully validated by means of comparing the Markov model results with those of system-level simulations.

Journal ArticleDOI
TL;DR: The results show that it is practically impossible to predict the actual capacity of a cell based on known theoretical models and standard parameters, even when supplemented by key field measurements such as the received signal-to-noise ratio Ec/N0.
Abstract: This paper presents the findings of an extensive measurement study on multiple commercial third-generation (3G) networks. We have investigated the performance of those 3G networks in terms of their data throughput, latency, video and voice call handling capacities, and their ability to provide service guarantees to different traffic classes under saturated and lightly loaded network conditions. Our findings point to the diverse nature of the network resources allocation mechanisms and the call admission control policies adopted by different operators. It is also found that the 3G network operators seem to have extensively customized their network configurations in a cell-by-cell manner according to the individual site's local demographics, projected traffic demand, and the target coverage area of the cell. As such, the cell capacity varies widely not only across different operators but also across different measurement sites of the same operator. The results also show that it is practically impossible to predict the actual capacity of a cell based on known theoretical models and standard parameters, even when supplemented by key field measurements such as the received signal-to-noise ratio Ec/N0.