scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Wireless Communications in 2007"


Journal ArticleDOI
TL;DR: A comprehensive review of the existing literature on techniques and protocols for in-network aggregation in wireless sensor networks is provided, and suitable criteria to classify existing solutions are defined.
Abstract: In this article we provide a comprehensive review of the existing literature on techniques and protocols for in-network aggregation in wireless sensor networks. We first define suitable criteria to classify existing solutions, and then describe them by separately addressing the different layers of the protocol stack while highlighting the role of a cross-layer design approach, which is likely to be needed for optimal performance. Throughout the article we identify and discuss open issues, and propose directions for future research in the area

794 citations


Journal ArticleDOI
TL;DR: Simulation results show that the proposed schemes can significantly reduce contention at the MAC layer by achieving up to 70 percent reduction in packet loss rate while keeping end-to-end delay at acceptable levels for most VANET applications.
Abstract: Several multihop applications developed for vehicular ad hoc networks use broadcast as a means to either discover nearby neighbors or propagate useful traffic information to other vehicles located within a certain geographical area. However, the conventional broadcast mechanism may lead to the so-called broadcast storm problem, a scenario in which there is a high level of contention and collisions at the link layer due to an excessive number of broadcast packets. While this is a well-known problem in mobile ad hoc wireless networks, only a few studies have addressed this issue in the VANET context, where mobile hosts move along the roads in a certain limited set of directions as opposed to randomly moving in arbitrary directions within a bounded area. Unlike other existing works, we quantify the impact of broadcast storms in VANETs in terms of message delay and packet loss rate in addition to conventional metrics such as message reachability and overhead. Given that VANET applications are currently confined to using the DSRC protocol at the data link layer, we propose three probabilistic and timer-based broadcast suppression techniques: weighted p-persistence, slotted 1-persistence, and slotted p-persistence schemes, to be used at the network layer. Our simulation results show that the proposed schemes can significantly reduce contention at the MAC layer by achieving up to 70 percent reduction in packet loss rate while keeping end-to-end delay at acceptable levels for most VANET applications.

769 citations


Journal ArticleDOI
TL;DR: In this article, the authors summarize most of the concepts related to localization systems for WSNs as well as how to localize the nodes in these networks, which allows the localization of phenomena.
Abstract: Monitoring applications define an important class of applications used in wireless sensor networks In these applications the network perceives the environment and searches for event occurrences (phenomena) by sensing different physical properties, such as temperature, humidity, pressure, ambient light, movement, and presence (for target tracking) In such cases the location information of both phenomena and nodes is usually required for tracking and correlation purposes In this work we summarize most of the concepts related to localization systems for WSNs as well as how to localize the nodes in these networks (which allows the localization of phenomena) By dividing the localization systems into three distinct components -distance/angle estimation, position computation, and localization algorithm - besides providing a didactic viewpoint, we show that these components can be seen as subareas of the localization problem that need to be analyzed and studied separately

646 citations


Journal ArticleDOI
TL;DR: The state of the art and the major research challenges in architectures, algorithms, and protocols for wireless multimedia sensor networks, including existing solutions at the physical, link, network, transport, and application layers of the communication protocol stack are investigated.
Abstract: In recent years, the growing interest in the wireless sensor network (WSN) has resulted in thousands of peer-reviewed publications. Most of this research is concerned with scalar sensor networks that measure physical phenomena, such as temperature, pressure, humidity, or location of objects that can be conveyed through low-bandwidth and delay-tolerant data streams. Recently, the focus is shifting toward research aimed at revisiting the sensor network paradigm to enable delivery of multimedia content, such as audio and video streams and still images, as well as scalar data. This effort will result in distributed, networked systems, referred to in this paper as wireless multimedia sensor networks (WMSNs). This article discusses the state of the art and the major research challenges in architectures, algorithms, and protocols for wireless multimedia sensor networks. Existing solutions at the physical, link, network, transport, and application layers of the communication protocol stack are investigated. Finally, fundamental open research issues are discussed, and future research trends in this area are outlined.

597 citations


Journal ArticleDOI
TL;DR: This article investigates the state-of-the-art of security issues in MANET and examines routing attacks, such as link spoofing and colluding misrelay attacks, as well as countermeasures against such attacks in existing MANET protocols.
Abstract: Recently, mobile ad hoc networks became a hot research topic among researchers due to their flexibility and independence of network infrastructures, such as base stations. Due to unique characteristics, such as dynamic network topology, limited bandwidth, and limited battery power, routing in a MANET is a particularly challenging task compared to a conventional network. Early work in MANET research has mainly focused on developing an efficient routing mechanism in such a highly dynamic and resource-constrained network. At present, several efficient routing protocols have been proposed for MANET. Most of these protocols assume a trusted and cooperative environment. However, in the presence of malicious nodes, the networks are vulnerable to various kinds of attacks. In MANET, routing attacks are particularly serious. In this article, we investigate the state-of-the-art of security issues in MANET. In particular, we examine routing attacks, such as link spoofing and colluding misrelay attacks, as well as countermeasures against such attacks in existing MANET protocols.

447 citations


Journal ArticleDOI
TL;DR: The current status and direction of future development of UWB, emerging 60 GHz millimeter-wave PAN, and low data rate ZigBee are described and wireless MAC protocol issues of 60 GHz multigigabit PAN are addressed.
Abstract: This article presents standardization, regulation, and development issues associated with short-range wireless technologies for next-generation personal area networks (PAN). Ultra-wideband (UWB) and 60 GHz millimeter-wave communication technologies promise unprecedented short-range broadband wireless communication and are the harbingers of multigigabit wireless networks. Despite the huge potential for PAN, standardization and global spectrum regulations challenge the success of UWB. On the other hand, ZigBeetrade is expected to be a crucial short-range technology for low throughput and ultra low-power consumption networks. The current status and direction of future development of UWB, emerging 60 GHz millimeter-wave PAN, and low data rate ZigBee are described. This article also addresses wireless MAC protocol issues of 60 GHz multigigabit PAN.

390 citations


Journal ArticleDOI
TL;DR: It is argued that many of the traditional interference management techniques have limited usefulness when viewed in concert with MIMO, and emerging system-level interference-reducing strategies based on cooperation will be important for overcoming interference in future spatial multiplexing cellular systems.
Abstract: Multi-antenna transmission and reception (known as MIMO) is widely touted as the key technology for enabling wireless broadband services, whose widespread success will require 10 times higher spectral efficiency than current cellular systems, at 10 times lower cost per bit. Spectrally efficient, inexpensive cellular systems are by definition densely populated and interference-limited. But spatial multiplexing MIMO systems- whose principal merit is a supposed dramatic increase in spectral efficiency- lose much of their effectiveness in high levels of interference. This article overviews several approaches to handling interference in multicell MIMO systems. The discussion is applicable to any multi-antenna cellular network, including 802.16e/WiMAX, 3GPP (HSDPA and 3GPP LTE), and 3GPP2 (lxEVDO). We argue that many of the traditional interference management techniques have limited usefulness (or are even counterproductive) when viewed in concert with MIMO. The problem of interference in MIMO systems is too large in scope to be handled with a single technique: in practice a combination of complementary countermeasures will be needed. We overview emerging system-level interference-reducing strategies based on cooperation, which will be important for overcoming interference in future spatial multiplexing cellular systems.

383 citations


Journal ArticleDOI
TL;DR: The goal is to incorporate the results of the learning engine into a predicate calculus-based reasoning engine so that radios can remember lessons learned in the past and act quickly in the future.
Abstract: Cognitive radio offers the promise of intelligent radios that can learn from and adapt to their environment. To date, most cognitive radio research has focused on policy-based radios that are hard-coded with a list of rules on how the radio should behave in certain scenarios. Some work has been done on radios with learning engines tailored for very specific applications. This article describes a concrete model for a generic cognitive radio to utilize a learning engine. The goal is to incorporate the results of the learning engine into a predicate calculus-based reasoning engine so that radios can remember lessons learned in the past and act quickly in the future. We also investigate the differences between reasoning and learning, and the fundamentals of when a particular application requires learning, and when simple reasoning is sufficient. The basic architecture is consistent with cognitive engines seen in AI research. The focus of this article is not to propose new machine learning algorithms, but rather to formalize their application to cognitive radio and develop a framework from within which they can be useful. We describe how our generic cognitive engine can tackle problems such as capacity maximization and dynamic spectrum access.

340 citations


Journal ArticleDOI
TL;DR: This article presents an optimal energy management policy for a solar-powered sensor node that uses a sleep and wakeup strategy for energy conservation and uses the Nash equilibrium as the solution of this game.
Abstract: Energy harvesting technologies are required for autonomous sensor networks for which using a power source from a fixed utility or manual battery recharging is infeasible An energy harvesting device (eg, a solar cell) converts different forms of environmental energy into electricity to be supplied to a sensor node However, since it can produce energy only at a limited rate, energy saving mechanisms play an important role to reduce energy consumption in a sensor node In this article we present an overview of the different energy harvesting technologies and the energy saving mechanisms for wireless sensor networks The related research issues on energy efficiency for sensor networks using energy harvesting technology are then discussed To this end, we present an optimal energy management policy for a solar-powered sensor node that uses a sleep and wakeup strategy for energy conservation The problem of determining the sleep and wakeup probabilities is formulated as a bargaining game The Nash equilibrium is used as the solution of this game

262 citations


Journal ArticleDOI
TL;DR: The challenge of constructing intrusion detection systems for mobile ad hoc networks and wireless sensor networks is presented, the existing intrusion detection techniques are surveyed, and important future research directions are indicated.
Abstract: Mobile ad hoc networks and wireless sensor networks have promised a wide variety of applications. However, they are often deployed in potentially adverse or even hostile environments. Therefore, they cannot be readily deployed without first addressing security challenges. Intrusion detection systems provide a necessary layer of in-depth protection for wired networks. However, relatively little research has been performed about intrusion detection in the areas of mobile ad hoc networks and wireless sensor networks. In this article, first we briefly introduce mobile ad hoc networks and wireless sensor networks and their security concerns. Then, we focus on their intrusion detection capabilities. Specifically, we present the challenge of constructing intrusion detection systems for mobile ad hoc networks and wireless sensor networks, survey the existing intrusion detection techniques, and indicate important future research directions.

205 citations


Journal ArticleDOI
TL;DR: This article decomposes the agent design functionality into four components, that is, architecture, itinerary planning, middleware system design, and agent cooperation, which facilitates the creation of a component-based and efficient mobile agent system for a wide range of applications.
Abstract: Recently, research interest has increased in the design, development, and deployment of mobile agent systems for high-level inference and surveillance in a wireless sensor network (WSN). Mobile agent systems employ migrating codes to facilitate flexible application re-tasking, local processing, and collaborative signal and information processing. This provides extra flexibility, as well as new capabilities to WSNs in contrast to the conventional WSN operations based on the client-server computing model. In this article we survey the potential applications of mobile agents in WSNs and discuss the key design issues for such applications. We decompose the agent design functionality into four components, that is, architecture, itinerary planning, middleware system design, and agent cooperation. This taxonomy covers low-level to high-level design issues and facilitates the creation of a component-based and efficient mobile agent system for a wide range of applications. With a different realization for each design component, it is expected that flexible trade-offs (e.g., between energy and delay) can be achieved according to specific application requirements.

Journal ArticleDOI
TL;DR: Key challenges that are impeding the rapid progress of wireless mesh networks are pointed out and the feasibility of some state-of-the-art technologies/protocols for adequately addressing these challenges are discussed.
Abstract: Within the short span of a decade, Wi-Fi hotspots have revolutionized Internet service provisioning. With the increasing popularity and rising demand for more public Wi-Fi hotspots, network service providers are facing a daunting task. Wi-Fi hotspots typically require extensive wired infrastructure to access the backhaul network, which is often expensive and time consuming to provide in such situations. wireless mesh networks (WMNs) offer an easy and economical alternative for providing broadband wireless Internet connectivity and could be called the web-in-the-sky. In place of an underlying wired backbone, a WMN forms a wireless backhaul network, thus obviating the need for extensive cabling. They are based on multihop communication paradigms that dynamically form a connected network. However, multihop wireless communication is severely plagued by many limitations such as low throughput and limited capacity. In this article we point out key challenges that are impeding the rapid progress of this upcoming technology. We systematically examine each layer of the network and discuss the feasibility of some state-of-the-art technologies/protocols for adequately addressing these challenges. We also provide broader and deeper insight to many other issues that are of paramount importance for the successful deployment and wider acceptance of WMNs.

Journal ArticleDOI
TL;DR: Some attractive features of OFMD-IDMA are explained, including low-cost iterative multi-user detection, flexible rate adaptation, frequency diversity, and significant advantages regarding spectral and power efficiency.
Abstract: This article outlines the basic principles of OFDM-IDMA. Comparisons with other alternative technologies such as OFDM-CDMA and OFDMA are provided. Some attractive features of OFMD-IDMA are explained, including low-cost iterative multi-user detection, flexible rate adaptation, frequency diversity, and significant advantages regarding spectral and power efficiency.

Journal ArticleDOI
TL;DR: Performance results show that STF coding can achieve the maximum diversity gain in an end- to-end MIMO-OFDM system over broadband wireless channels, and for orthogonal frequency division multiple access (OFDMA), a multiuser SF coding scheme is proposed that can achieveThe maximum diversity for each user while minimizing the interference introduced from all the other users.
Abstract: With the advent of next generation (4G) broadband wireless communications, the combination of multiple-input multiple-output (MIMO) wireless technology with orthogonal frequency division multiplexing (OFDM) has been recognized as one of the most promising techniques to support high data rate and high performance. In particular, coding over the space, time, and frequency domains provided by MIMO-OFDM will enable a much more reliable and robust transmission over the harsh wireless environment. In this article we provide an overview of space-time (ST) coding, space-frequency (SF) coding, and space-time-frequency (STF) coding for MIMO-OFDM systems. Performance results show that STF coding can achieve the maximum diversity gain in an end- to-end MIMO-OFDM system over broadband wireless channels. Furthermore, for orthogonal frequency division multiple access (OFDMA), we propose a multiuser SF coding scheme that can achieve the maximum diversity for each user while minimizing the interference introduced from all the other users.

Journal ArticleDOI
TL;DR: A decision-theoretic framework based on the theory of partially observable Markov decision processes is introduced, which allows us to systematically tackle the optimal integrated design and quantitatively characterize the interaction between signal processing for opportunity identification and networking for opportunity exploitation.
Abstract: Built on a hierarchical access structure with primary and secondary users, opportunistic spectrum access improves spectrum efficiency while maintaining compatibility with legacy wireless systems. The basic idea is to allow secondary users to exploit instantaneous spectrum availability while limiting the interference to primary users. In this article, we identify basic components, fundamental trade-offs, and practical constraints in opportunistic spectrum access. We introduce a decision-theoretic framework based on the theory of partially observable Markov decision processes. This framework allows us to systematically tackle the optimal integrated design and quantitatively characterize the interaction between signal processing for opportunity identification and networking for opportunity exploitation. A discussion of open problems, potential applications, and recent developments is also provided.

Journal ArticleDOI
TL;DR: This study unveils that location information can be used in cognitive wireless networks to optimize network performance by presenting some representative location-assisted network optimization applications.
Abstract: Location awareness is an essential characteristic of cognitive radios as well as networks. In this article a location awareness engine architecture is proposed for the realization of location awareness in cognitive radios and networks. The proposed architecture consists of location estimation and/or sensing, seamless positioning and interoperability, statistical learning and tracking, security and privacy, mobility management, and location-based applications. However, the focus of this article is on location-based applications where we demonstrate the utilization of location information in cognitive wireless networks by presenting some representative location-assisted network optimization applications such as location-assisted spectrum management, network planning and expansion, and handover. Our study unveils that location information can be used in cognitive wireless networks to optimize network performance. Possible solutions to the implementation issues are proposed, and the remaining open issues are also addressed.

Journal ArticleDOI
TL;DR: A bandwidth allocation and admission control algorithm for IEEE 802.16-based BWA designed specifically for wireless telemedicine/e-health services is presented, which aims at maximizing the utilization of the radio resources while considering the quality of service requirements for teleMedicine traffic.
Abstract: In this article we investigate the application of IEEE 802.16-based broadband wireless access (BWA) technology to telemedicine services and the related protocol engineering issues. An overview of the different evolutions of the IEEE 802.16 standard is presented and some open research issues are identified. A survey on radio resource management, traffic scheduling, and admission control mechanisms proposed for IEEE 802.16/WiMAX systems is also provided. A qualitative comparison between third-generation wireless systems and the IEEE 802.16/WiMAX technology is given. A survey on telemedicine services using traditional wireless systems is presented. The advantages of using IEEE 802.16/WiMAX technology over traditional wireless systems, as well as the related design issues and approaches are discussed. To this end, we present a bandwidth allocation and admission control algorithm for IEEE 802.16-based BWA designed specifically for wireless telemedicine/e-health services. This algorithm aims at maximizing the utilization of the radio resources while considering the quality of service requirements for telemedicine traffic. Some performance evaluation results for this scheme are obtained by simulations

Journal ArticleDOI
TL;DR: This article surveys existing fault management approaches for WSNs and divides the fault management process into three phases: fault detection, diagnosis, and recovery and classify existing approaches according to these phases.
Abstract: Wireless sensor networks (WSNs) have gradually emerged as one of the key growth areas for pervasive computing in the twenty-first century. Recent advances in WSN technologies have made possible the development of new wireless monitoring and environmental control applications. However, the nature of these applications and harsh environments also created significant challenges for sensor networks to maintain a high quality of service in potentially harsh environments. Therefore, efficient fault management and robust management architectures have become essential for WSNs. In this article, we address these challenges by surveying existing fault management approaches for WSNs. We divide the fault management process into three phases: fault detection, diagnosis, and recovery and classify existing approaches according to these phases. Finally, we outline future challenges for fault management in WSNs.

Journal ArticleDOI
TL;DR: Within the short span of a decade, Wi-Fi hotspots have revolutionized Internet service provisioning and with the increasing popularity and rising demand for more public Wi-fi hotspots, network service...
Abstract: Within the short span of a decade, Wi-Fi hotspots have revolutionized Internet service provisioning. With the increasing popularity and rising demand for more public Wi-Fi hotspots, network service...

Journal ArticleDOI
TL;DR: A survey of recent advances in security requirements and services in group communications in three types of wireless networks, and discusses challenges in designing secure group Communications in these networks: wireless infrastructure networks, mobile ad hoc Networks, and wireless sensor networks.
Abstract: Group communications in wireless networks has been facilitating many emerging applications that require packet delivery from one or more sender(s) to multiple receivers. Due to insecure wireless channels, group communications are susceptible to various kinds of attacks. Although a number of proposals have been reported to secure group communications, provisioning security in group communications in wireless networks remains a critical and challenging issue. This article presents a survey of recent advances in security requirements and services in group communications in three types of wireless networks, and discusses challenges in designing secure group communications in these networks: wireless infrastructure networks, mobile ad hoc networks, and wireless sensor networks.

Journal ArticleDOI
TL;DR: A new architecture capable of supporting ABC service is proposed and demonstrates that it has benefits not only for network operators, but also for users.
Abstract: In recent years, wireless communication technology has undergone a tremendous change. Various radio access technologies have been deployed all over the world. The 4G mobile system was proposed to integrate all of these radio access technologies into a common network called the open wireless architecture (OWA) platform. As one of the main features of a 4G mobile system, always best connected (ABC) services enable users to choose the best available access networks in a way that best suits their needs. A new architecture capable of supporting ABC service is proposed in this study. There are three parts to the proposed architecture. First, a novel access discovery mechanism that integrates service location protocol and location-based service is presented. Second, a new personalized network selection scheme is put forward. Users can select their personalized "best" network by changing weight factors and constraints in a single objective optimization problem. Third, a seamless handover mechanism based on Mobile IPv6 is proposed. The mechanism supports end-to-end quality of service. Through analysis, this architecture demonstrates that it has benefits not only for network operators, but also for users

Journal ArticleDOI
TL;DR: The results of the experiments and measurements show that ZigBee is a viable and promising technology for implementing an intra-car wireless sensor network.
Abstract: There is a growing interest in eliminating the wires connecting sensors to the microprocessors in cars due to an increasing number of sensors deployed in modern cars. One option for implementing an intra-car wireless sensor network is the use of ZigBee technology. In this article we report the results of a ZigBee-based case study conducted in a vehicle. Overall, the results of the experiments and measurements show that ZigBee is a viable and promising technology for implementing an intra-car wireless sensor network.

Journal ArticleDOI
TL;DR: The need for a cross-layer consideration of MAC and CCA to optimize the performance of CSMA protocols is demonstrated.
Abstract: This is intended as a tutorial review of the clear channel assessment (CCA) component of typical data link layers in wideband wireless networks that employ some form of channel sensing as part of their medium access mechanism. While channel sensing - the core component within CCA module - is implemented at the physical layer, its primary impact is on MAC throughput and energy efficiency, and this impact has not yet been adequately highlighted in the existing literature. We provide a description of CCA methods for wideband wireless networks like IEEE 802.11 and IEEE 802.15 followed by illustrations of their impact on the respective MAC protocols. We also demonstrate the need for a cross-layer consideration of MAC and CCA to optimize the performance of CSMA protocols.

Journal ArticleDOI
TL;DR: This contribution starts with a brief section that underlines the paramount importance of the mobile radio communications channel and describes practical steps to an implementation of helpful CR properties into a mobile communication base station, as well as user terminal equipment.
Abstract: Cognitive radio is an emerging technology that enables the flexible development, construction, production, shipping, and deployment of highly adaptive radios that are built upon software defined radio technology. This contribution starts with a brief section that underlines the paramount importance of the mobile radio communications channel. Then, spectrum issues are discussed to emphasize the reasons for spectrum scarcity as well as the importance of dynamic spectrum allocation. Some remarks about the development of software defined radio from digital radio lead to a discussion of the most important engineering aspects of CR, for example, location and spectrum awareness, transmission power control, and signal analysis. Because usually papers about CR are somewhat visionary, we first describe practical steps to an implementation of helpful CR properties into a mobile communication base station, as well as user terminal equipment. The article concludes with a short summary.

Journal ArticleDOI
TL;DR: A person-centric IPv6 address enabling full number portability and an access-network-independent third-party authentication, authorization, and accounting (3P-AAA) service provision, which will empower users to opt out of their long-term subscriptions with access network providers and use advertised communication services from any consumer-centric wireless access network that is present to them are proposed.
Abstract: This article sets out a consumer-based generic techno-business model foundation for future generations of wireless communications. It is proposed as an evolution of, and alternative to, the legacy subscriber-based model. Two key novel proposals are a person-centric IPv6 address enabling full number portability and an access-network-independent third-party authentication, authorization, and accounting (3P-AAA) service provision, which will empower users to opt out of their long-term subscriptions with access network providers and use advertised communication services from any consumer-centric wireless access network that is present to them. The wireless environment thus created is described as a ubiquitous consumer wireless world (UCWW). Its most characteristic attributes are consumer choice, consumer-driven "always best connected and served", consumer-driven integrated heterogeneous networking, elimination of roaming charges, a level "playing field" for new access network provider entrants, and a potential commercial ad hoc networking solution. New core UCWW infrastructural entities and functionalities proposed and described include 3P-AAA service provisioning; a universal CIM1 card; a personal IPv6 address class, wireless billboard channels; advertisement, discovery, and association services; and access-network-independent incoming call connection service providers. Typical interrelationships and operation of these entities are illustrated by means of an example. UCWW elements requiring standardization are noted

Journal ArticleDOI
TL;DR: A survey of various routing protocols that aims to address the crucial issues stemming from these properties of satellite systems, such as dynamic topology, non-homogeneous traffic distribution, limited power and processing capabilities, and high propagation delays.
Abstract: Employing an efficient routing algorithm in satellite networks is a critical issue, because satellite network resources are costly and must be managed in an optimal and effective manner. Because of the particular features of satellite networks, such as dynamic topology, non-homogeneous traffic distribution, limited power and processing capabilities, and high propagation delays, new routing approaches should be developed. In this article, we first examine these properties with particular emphasis on their effect on the routing objectives. Subsequently, we provide a survey of various routing protocols that aims to address the crucial issues stemming from these properties of satellite systems. We classify these protocols according to their objectives, and discuss their advantages and disadvantages. We also elaborate on relevant technical aspects.

Journal ArticleDOI
TL;DR: The security and operational requirements of WSNs are examined and then five key management protocols are reviewed: Eschenauer, Du, LEAP, SHELL, and Panja.
Abstract: Key management has remained a challenging issue in wireless sensor networks (WSNs) due to the constraints of sensor node resources. Various key management schemes that trade off security and operational requirements have been proposed in recent years. In this article, we first examine the security and operational requirements of WSNs and then review five key management protocols: Eschenauer, Du, LEAP, SHELL, and Panja. Eschenauer's scheme is a classical random key distribution scheme for WSNs. Du's scheme improves on Eschenauer's scheme by using key matrices. LEAP provides a highly flexible key management scheme using four types of keys. SHELL focuses on achieving high robustness, and Panja is optimized for hierarchical WSNs. LEAP, SHELL, and Panja support cluster-based operations and are more aligned with current trends as shown by the new standards, IEEE 802.15.4b and the ZigBee "enhanced" standard. Future developments likely will incorporate the features of LEAP and adjustable robustness enhancements from Eschenauer or Du; extremely security-critical applications may benefit from restructuring SHELL to ease implementation and maintenance. Developments for extremely large WSNs should consider improving Panja's scheme due to its hierarchical scalability feature.

Journal ArticleDOI
TL;DR: This article presents a three-layer, service-oriented architecture that accommodates different sensor platforms and exposes their functionality in a uniform way to the business application through the universal plug and play (UPnP) standard and incorporated into an enterprise software system.
Abstract: Massively deployed wireless sensor and actuator networks, co-existing with RFID technology, can bring clear benefits to large-scale enterprise systems, by delegating parts of the business functionality closer to the point of action. However, a major impediment in the integration process is represented by the variety of customized platforms and proprietary technologies. In this article, we present a three-layer, service-oriented architecture that accommodates different sensor platforms and exposes their functionality in a uniform way to the business application. Our work is motivated by real business cases from the oil and gas industry. In our implementation, we use three sensor platforms (particle, muNode, and Sindrion) integrated through the universal plug and play (UPnP) standard and incorporated into an enterprise software system. The practical tests and application trials confirm the feasibility of our solution but also reveal a number of challenges to be taken into account when deploying wireless sensor and actuator networks at industrial sites.

Journal ArticleDOI
TL;DR: An adaptive bandwidth allocation and admission control scheme for polling service in an IEEE 802.16-based wireless metropolitan area network and the solution of this game is determined by the Nash equilibrium for the amount of bandwidth offered to a new connection.
Abstract: Game theory is a mathematical tool developed to understand competitive situations in which rational decision makers interact to achieve their objectives. Game theory techniques have recently been applied to various engineering design problems in which the action of one component impacts (and perhaps conflicts with) that of any other component. In particular, game theory techniques have been successfully used for protocol design and optimization (e.g., radio resource management, power control) in wireless networks. In this article we present an overview of different game theory formulations. Then a survey on the game-theory-based resource management and admission control schemes in different wireless networks is presented, and several open research issues are outlined. To this end, we propose an adaptive bandwidth allocation and admission control scheme for polling service in an IEEE 802.16-based wireless metropolitan area network. A noncooperative game is formulated, and the solution of this game is determined by the Nash equilibrium for the amount of bandwidth offered to a new connection. The admission control policy ensures QoS for all connections in the system

Journal ArticleDOI
TL;DR: This article focuses on four interrelated resource allocation problems in IEEE 802.16 wireless metropolitan area networks employing orthogonal frequency division multiple access: dynamic subcarrier allocation, adaptive power allocation, admission control, and capacity planning.
Abstract: In this article we present important resource allocation problems in IEEE 802.16 wireless metropolitan area networks employing orthogonal frequency division multiple access. We first highlight the unique aspects of these networks and identify challenges and opportunities provided by the physical and medium access control layers. Next, we concentrate on four interrelated resource allocation problems: dynamic subcarrier allocation, adaptive power allocation, admission control, and capacity planning. We describe solution techniques, provide preliminary results, and discuss open problems for future research