scispace - formally typeset
Search or ask a question

Showing papers on "Node (networking) published in 2007"


Journal ArticleDOI
TL;DR: This paper investigates a simple label propagation algorithm that uses the network structure alone as its guide and requires neither optimization of a predefined objective function nor prior information about the communities.
Abstract: Community detection and analysis is an important methodology for understanding the organization of various real-world networks and has applications in problems as diverse as consensus formation in social communities or the identification of functional modules in biochemical networks. Currently used algorithms that identify the community structures in large-scale real-world networks require a priori information such as the number and sizes of communities or are computationally expensive. In this paper we investigate a simple label propagation algorithm that uses the network structure alone as its guide and requires neither optimization of a predefined objective function nor prior information about the communities. In our algorithm every node is initialized with a unique label and at every step each node adopts the label that most of its neighbors currently have. In this iterative process densely connected groups of nodes form a consensus on a unique label to form communities. We validate the algorithm by applying it to networks whose community structures are known. We also demonstrate that the algorithm takes an almost linear time and hence it is computationally less expensive than what was possible so far.

3,095 citations


Journal ArticleDOI
TL;DR: A taxonomy and general classification of published clustering schemes for WSNs is presented, highlighting their objectives, features, complexity, etc and comparing of these clustering algorithms based on metrics such as convergence rate, cluster stability, cluster overlapping, location-awareness and support for node mobility.

2,283 citations


Journal ArticleDOI
TL;DR: In this article, two power allocation schemes are proposed to minimize the system outage probability, based on complete channel state information and channel statistics, respectively, and a selection scheme where only one "best" relay node is chosen to assist in the transmission is proposed.
Abstract: -We consider an Amplify-and-Forward cooperative diversity system where a source node communicates with a destination node with the help of one or more relay nodes The conventional system model assumes all relay nodes participate, with the available channel and power resources equally distributed over all nodes This approach being clearly sub-optimal, we first present two power allocation schemes to minimize the system outage probability, based on complete channel state information and channel statistics, respectively We further show that the proposed optimal power allocation methods minimize system symbol error rate as well Next, we propose a selection scheme where only one "best" relay node is chosen to assist in the transmission We show that the selection-AF scheme maintains full diversity order, and at reasonable power levels has significantly better outage behavior and average throughput than the conventional all-participate scheme or that with optimal power allocation Finally we combine power allocation and selection to further improve performance

888 citations


Journal ArticleDOI
TL;DR: Much better scaling than multihop can be achieved in dense networks, as well as in extended networks with low attenuation, and the total capacity of the network scales linearly with n.
Abstract: n source and destination pairs randomly located in an area want to communicate with each other. Signals transmitted from one user to another at distance r apart are subject to a power loss of r-alpha as well as a random phase. We identify the scaling laws of the information-theoretic capacity of the network when nodes can relay information for each other. In the case of dense networks, where the area is fixed and the density of nodes increasing, we show that the total capacity of the network scales linearly with n. This improves on the best known achievability result of n2/3 of Aeron and Saligrama. In the case of extended networks, where the density of nodes is fixed and the area increasing linearly with n, we show that this capacity scales as n2-alpha/2 for 2lesalpha 4. Thus, much better scaling than multihop can be achieved in dense networks, as well as in extended networks with low attenuation. The performance gain is achieved by intelligent node cooperation and distributed multiple-input multiple-output (MIMO) communication. The key ingredient is a hierarchical and digital architecture for nodal exchange of information for realizing the cooperation.

756 citations


Journal ArticleDOI
TL;DR: An adaptive distributed strategy is developed based on incremental techniques that addresses the problem of linear estimation in a cooperative fashion, in which nodes equipped with local computing abilities derive local estimates and share them with their predefined neighbors.
Abstract: An adaptive distributed strategy is developed based on incremental techniques. The proposed scheme addresses the problem of linear estimation in a cooperative fashion, in which nodes equipped with local computing abilities derive local estimates and share them with their predefined neighbors. The resulting algorithm is distributed, cooperative, and able to respond in real time to changes in the environment. Each node is allowed to communicate with its immediate neighbor in order to exploit the spatial dimension while limiting the communications burden at the same time. A spatial-temporal energy conservation argument is used to evaluate the steady-state performance of the individual nodes across the entire network. Computer simulations illustrate the results.

706 citations


Journal ArticleDOI
TL;DR: It is demonstrated that cooperation among stations in a wireless LAN (WLAN) can achieve both higher throughput and lower interference, and a reduction in the signal-to-interference ratio in a dense deployment of 802.11 access points is demonstrated.
Abstract: Due to the broadcast nature of wireless signals, a wireless transmission intended for a particular destination station can be overheard by other neighboring stations. A focus of recent research activities in cooperative communications is to achieve spatial diversity gains by requiring these neighboring stations to retransmit the overheard information to the final destination. In this paper we demonstrate that such cooperation among stations in a wireless LAN (WLAN) can achieve both higher throughput and lower interference. We present the design for a medium access control protocol called CoopMAC, in which high data rate stations assist low data rate stations in their transmission by forwarding their traffic. In our proposed protocol, using the overheard transmissions, each low data rate node maintains a table, called a CoopTable, of potential helper nodes that can assist in its transmissions. During transmission, each low data rate node selects either direct transmission or transmission through a helper node in order to minimize the total transmission time. Using analysis, simulation and testbed experimentation, we quantify the increase in the total network throughput, and the reduction in delay, if such cooperative transmissions are utilized. The CoopMAC protocol is simple and backward compatible with the legacy 802.11 system. In this paper, we also demonstrate a reduction in the signal-to-interference ratio in a dense deployment of 802.11 access points, which in some cases is a more important consequence of cooperation

688 citations


Journal ArticleDOI
TL;DR: It is shown that for a cellular system employing orthogonal frequency-division multiple-access (OFDMA), the optimization of physical-layer transmission strategies can be done efficiently by introducing a set of pricing variables as weighting factors.
Abstract: This paper considers a wireless cooperative cellular data network with a base station and many subscribers in which the subscribers have the ability to relay information for each other to improve the overall network performance. For a wireless network operating in a frequency-selective slow-fading environment, the choices of relay node, relay strategy, and the allocation of power and bandwidth for each user are important design parameters. The design challenge is compounded further by the need to take user traffic demands into consideration. This paper proposes a centralized utility maximization framework for such a network. We show that for a cellular system employing orthogonal frequency-division multiple-access (OFDMA), the optimization of physical-layer transmission strategies can be done efficiently by introducing a set of pricing variables as weighting factors. The proposed solution incorporates both user traffic demands and the physical channel realizations in a cross-layer design that not only allocates power and bandwidth optimally for each user, but also selects the best relay node and best relay strategy (i.e. decode-and-forward vs. amplify-and-forward) for each source-destination pair

517 citations


Proceedings ArticleDOI
18 Jun 2007
TL;DR: A new technique for solving the problem of adaptive duty-cycling based on results from adaptive control theory is introduced and it is shown that it achieves better performance than previous approaches on a broader class of energy source data sets.
Abstract: Increasingly many wireless sensor network deployments are using harvested environmental energy to extend system lifetime. Because the temporal profiles of such energy sources exhibit great variability due to dynamic weather patterns, an important problem is designing an adaptive duty-cycling mechanism that allows sensor nodes to maintain their power supply at sufficient levels (energy neutral operation) by adapting to changing environmental conditions. Existing techniques to address this problem are minimally adaptive and assume a priori knowledge of the energy profile. While such approaches are reasonable in environments that exhibit low variance, we find that it is highly inefficient in more variable scenarios. We introduce a new technique for solving this problem based on results from adaptive control theory and show that we achieve better performance than previous approaches on a broader class of energy source data sets. Additionally, we include a tunable mechanism for reducing the variance of the node's duty cycle over time, which is an important feature in tasks such as event monitoring. We obtain reductions in variance as great as two-thirds without compromising task performance or ability to maintain energy neutral operation.

450 citations


Proceedings ArticleDOI
01 Apr 2007
TL;DR: This paper introduces a novel cognitive MAC (C-MAC) protocol for distributed multi-channel wireless networks that is able to effectively deal with the dynamics of resource availability due to primary users and mitigate the effects of distributed quiet periods utilized for primary user signal detection.
Abstract: A number of algorithmic and protocol assumptions taken for granted in the design of existing wireless communication technologies need to be revisited in extending their scope to the new cognitive radio (CR) paradigm. The fact that channel availability can rapidly change over time and the need for coordinated quiet periods in order to quickly and robustly detect the presence of incumbents, are just some of the examples of the unique challenges in protocol and algorithm design for CR networks and, in particular, in the medium access control (MAC) layer. With this in mind, in this paper we introduce a novel cognitive MAC (C-MAC) protocol for distributed multi-channel wireless networks. C-MAC operates over multiple channels, and hence is able to effectively deal with, among other things, the dynamics of resource availability due to primary users and mitigate the effects of distributed quiet periods utilized for primary user signal detection. In C-MAC, each channel is logically divided into recurring superframes which, in turn, include a slotted beaconing period (BP) where nodes exchange information and negotiate channel usage. Each node transmits a beacon in a designated beacon slot during the BP, which helps in dealing with hidden nodes, medium reservations, and mobility. For coordination amongst nodes in different channels, a rendezvous channel (RC) is employed that is decided dynamically and in a totally distributed fashion. Among other things, the RC is used to support network-wide multicast and broadcast which are often neglected in existing multi-channel MAC protocols. We present promising performance results of C- MAC. We also describe our efforts to implement features of C- MAC in a real CR prototype with Atheros chipset, which currently includes the spectrum sensing module and preliminary features of C-MAC.

449 citations


Book
01 Jan 2007
TL;DR: In this paper, a wireless sensor network comprises at least one sensor unit which comprises a sensor for sensing a parameter and at least an interrogating node, which is arranged to transmit an interrogation message periodically to the sensor unit and to receive a reply message from said sensor unit.
Abstract: A wireless sensor network comprises at least one sensor unit which comprises a sensor for sensing a parameter and at least one interrogating node. The interrogating node is arranged to transmit an interrogation message periodically to said sensor unit and to receive a reply message from said sensor unit. The sensor unit is arranged to transmit said reply message after a predetermined deliberate delay unless the sensor unit determines that an alarm condition has been met, in which case the sensor unit is arranged to transmit said reply message before the end of the deliberate delay.

448 citations


Journal ArticleDOI
TL;DR: This article provides a tutorial survey on various power allocation strategies for cooperative networks based on different cooperation strategies, optimizing criteria, and CSI assumptions and identifies the similarities between cooperative networks and several sensor network applications that utilize collaboration among distributed sensors to achieve the system goal.
Abstract: Cooperative communications have been proposed to exploit the spatial diversity gains inherent in multiuser wireless systems without the need of multiple antennas at each node. This is achieved by having the users relay each others messages and thus forming multiple transmission paths to the destination. In resource constrained networks, such as wireless sensor networks, the advantages of cooperation can be further exploited by optimally allocating the energy and bandwidth resources among users based on the available channel state information (CSI) at each node. In the first part of this article, we provide a tutorial survey on various power allocation strategies for cooperative networks based on different cooperation strategies, optimizing criteria, and CSI assumptions. In the second part, we identify the similarities between cooperative networks and several sensor network applications that utilize collaboration among distributed sensors to achieve the system goal. These applications include decentralized detection/estimation and data gathering. The techniques developed in cooperative communications can be used to solve many sensor network problems

Journal ArticleDOI
TL;DR: This paper proposes protocols, as components of a framework, for the identification and local containment of misbehaving or faulty nodes, and then for their eviction from the system, and shows that the distributed approach to contain nodes and contribute to their eviction is efficiently feasible and achieves a sufficient level of robustness.
Abstract: Vehicular networks (VNs) are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology. However, security is a critical factor and a significant challenge to be met. Misbehaving or faulty network nodes have to be detected and prevented from disrupting network operation, a problem particularly hard to address in the life-critical VN environment. Existing networks rely mainly on node certificate revocation for attacker eviction, but the lack of an omnipresent infrastructure in VNs may unacceptably delay the retrieval of the most recent and relevant revocation information; this will especially be the case in the early deployment stages of such a highly volatile and large-scale system. In this paper, we address this specific problem. We propose protocols, as components of a framework, for the identification and local containment of misbehaving or faulty nodes, and then for their eviction from the system. We tailor our design to the VN characteristics and analyze our system. Our results show that the distributed approach to contain nodes and contribute to their eviction is efficiently feasible and achieves a sufficient level of robustness.

Journal ArticleDOI
TL;DR: This work reports on an approach especially suited for module detection in bipartite networks, and defines a set of random networks that enable it to validate the approach.
Abstract: Modularity is one of the most prominent properties of real-world complex networks. Here, we address the issue of module identification in two important classes of networks: bipartite networks and directed unipartite networks. Nodes in bipartite networks are divided into two nonoverlapping sets, and the links must have one end node from each set. Directed unipartite networks only have one type of node, but links have an origin and an end. We show that directed unipartite networks can be conveniently represented as bipartite networks for module identification purposes. We report on an approach especially suited for module detection in bipartite networks, and we define a set of random networks that enable us to validate the approach.

Journal ArticleDOI
TL;DR: Using protein-protein interaction, gene co-expression, and simulated data, it is shown that many networks comprised of module nodes are approximately factorizable and in these types of networks, simple relationships exist between seemingly disparate network concepts.
Abstract: Network concepts are increasingly used in biology and genetics. For example, the clustering coefficient has been used to understand network architecture; the connectivity (also known as degree) has been used to screen for cancer targets; and the topological overlap matrix has been used to define modules and to annotate genes. Dozens of potentially useful network concepts are known from graph theory. Here we study network concepts in special types of networks, which we refer to as approximately factorizable networks. In these networks, the pairwise connection strength (adjacency) between 2 network nodes can be factored into node specific contributions, named node 'conformity'. The node conformity turns out to be highly related to the connectivity. To provide a formalism for relating network concepts to each other, we define three types of network concepts: fundamental-, conformity-based-, and approximate conformity-based concepts. Fundamental concepts include the standard definitions of connectivity, density, centralization, heterogeneity, clustering coefficient, and topological overlap. The approximate conformity-based analogs of fundamental network concepts have several theoretical advantages. First, they allow one to derive simple relationships between seemingly disparate networks concepts. For example, we derive simple relationships between the clustering coefficient, the heterogeneity, the density, the centralization, and the topological overlap. The second advantage of approximate conformity-based network concepts is that they allow one to show that fundamental network concepts can be approximated by simple functions of the connectivity in module networks. Using protein-protein interaction, gene co-expression, and simulated data, we show that a) many networks comprised of module nodes are approximately factorizable and b) in these types of networks, simple relationships exist between seemingly disparate network concepts. Our results are implemented in freely available R software code, which can be downloaded from the following webpage: http://www.genetics.ucla.edu/labs/horvath/ModuleConformity/ModuleNetworks

Proceedings ArticleDOI
14 Oct 2007
TL;DR: It is demonstrated that PeerReview is practical by applying it to three different types of distributed systems: a network filesystem, a peer-to-peer system, and an overlay multicast system.
Abstract: We describe PeerReview, a system that provides accountability in distributed systems. PeerReview ensures that Byzantine faults whose effects are observed by a correct node are eventually detected and irrefutably linked to a faulty node. At the same time, PeerReview ensures that a correct node can always defend itself against false accusations. These guarantees are particularly important for systems that span multiple administrative domains, which may not trust each other.PeerReview works by maintaining a secure record of the messages sent and received by each node. The record isused to automatically detect when a node's behavior deviates from that of a given reference implementation, thus exposing faulty nodes. PeerReview is widely applicable: it only requires that a correct node's actions are deterministic, that nodes can sign messages, and that each node is periodically checked by a correct node. We demonstrate that PeerReview is practical by applying it to three different types of distributed systems: a network filesystem, a peer-to-peer system, and an overlay multicast system.


Journal ArticleDOI
TL;DR: Novel deterministic and hybrid approaches based on Combinatorial Design are presented for deciding how many and which keys to assign to each key-chain before the sensor network deployment to obtain efficient key distribution schemes.
Abstract: Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no priory knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory. Thus, shared keys must be distributed before deployment to provide each node a key-chain. For large sensor networks it is infeasible to store a unique key for all other nodes in the key-chain of a sensor node. Consequently, for secure communication either two nodes have a key in common in their key-chains and they have a wireless link between them, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path have a key in common. Length of the key-path is the key factor for efficiency of the design. This paper presents novel deterministic and hybrid approaches based on Combinatorial Design for deciding how many and which keys to assign to each key-chain before the sensor network deployment. In particular, Balanced Incomplete Block Designs (BIBD) and Generalized Quadrangles (GQ) are mapped to obtain efficient key distribution schemes. Performance and security properties of the proposed schemes are studied both analytically and computationally. Comparison to related work shows that the combinatorial approach produces better connectivity with smaller key-chain sizes.

Journal ArticleDOI
01 Aug 2007
TL;DR: This paper presents a detailed analysis of MoteTrack’s performance under a wide range of conditions, including variance in the number of obstructions, beacon node failure, radio signature perturbations, receiver sensitivity, and beacon node density.
Abstract: In this paper, we present a robust, decentralized approach to RF-based location tracking. Our system, called MoteTrack, is based on low-power radio transceivers coupled with a modest amount of computation and storage capabilities. MoteTrack does not rely upon any back-end server or network infrastructure: the location of each mobile node is computed using a received radio signal strength signature from numerous beacon nodes to a database of signatures that is replicated across the beacon nodes themselves. This design allows the system to function despite significant failures of the radio beacon infrastructure. In our deployment of MoteTrack, consisting of 23 beacon nodes distributed across our Computer Science building, we achieve a 50th percentile and 80th percentile location-tracking accuracy of 0.9 and 1.6 m respectively. In addition, MoteTrack can tolerate the failure of up to 60% of the beacon nodes without severely degrading accuracy, making the system suitable for deployment in highly volatile conditions. We present a detailed analysis of MoteTrack's performance under a wide range of conditions, including variance in the number of obstructions, beacon node failure, radio signature perturbations, receiver sensitivity, and beacon node density.

Proceedings ArticleDOI
18 Jun 2007
TL;DR: A semidefinite program formulation of the optimization problem to obtain a lower bound on overall network interference is developed and empirical evaluations show that the algorithms perform close to the above established lower bound, with the difference diminishing rapidly with increase in number of radios.
Abstract: In this paper, we consider multi-hop wireless mesh networks, where each router node is equipped with multiple radio interfaces and multiple channels are available for communication. We address the problem of assigning channels to communication links in the network with the objective of minimizing overall network interference. Since the number of radios on any node can be less than the number of available channels, the channel assignment must obey the constraint that the number of different channels assigned to the links incident on any node is atmost the number of radio interfaces on that node. The above optimization problem is known to be NP-hard. We design centralized and distributed algorithms for the above channel assignment problem. To evaluate the quality of the solutions obtained by our algorithms, we develop a semidefinite program formulation of our optimization problem to obtain a lower bound on overall network interference. Empirical evaluations on randomly generated network graphs show that our algorithms perform close to the above established lower bound, with the difference diminishing rapidly with increase in number of radios. Also, detailed ns-2 simulation studies demonstrate the performance potential of our channel assignment algorithms in 802.11-based multi-radio mesh networks.

Proceedings ArticleDOI
01 May 2007
TL;DR: This work considers a scenario where a sophisticated jammer jams an area in a single-channel wireless sensor network and proposes a intuitive heuristic jamming strategy for that case that takes into account potential energy constraints of the jammer and the network.
Abstract: We consider a scenario where a sophisticated jammer jams an area in a single-channel wireless sensor network. The jammer controls the probability of jamming and transmission range to cause maximal damage to the network in terms of corrupted communication links. The jammer action ceases when it is detected by a monitoring node in the network, and a notification message is transferred out of the jamming region. The jammer is detected at a monitor node by employing an optimal detection test based on the percentage of incurred collisions. On the other hand, the network computes channel access probability in an effort to minimize the jamming detection plus notification time. In order for the jammer to optimize its benefit, it needs to know the network channel access probability and number of neighbors of the monitor node. Accordingly, the network needs to know the jamming probability of the jammer. We study the idealized case of perfect knowledge by both the jammer and the network about the strategy of one another, and the case where the jammer or the network lack this knowledge. The latter is captured by formulating and solving optimization problems, the solutions of which constitute best responses of the attacker or the network to the worst-case strategy of each other. We also take into account potential energy constraints of the jammer and the network. We extend the problem to the case of multiple observers and adaptable jamming transmission range and propose a intuitive heuristic jamming strategy for that case.

Journal ArticleDOI
01 Jan 2007
TL;DR: This work proposes a novel framework for secure information aggregation in sensor networks by constructing efficient random sampling mechanisms and interactive proofs that enable the querier to verify that the answer given by the aggregator is a good approximation of the true value, even when the aggregators and a fraction of the sensor nodes are corrupted.
Abstract: In sensor networks, data aggregation is a vital primitive enabling efficient data queries. An on-site aggregator device collects data from sensor nodes and produces a condensed summary which is forwarded to the off-site querier, thus reducing the communication cost of the query. Since the aggregator is on-site, it is vulnerable to physical compromise attacks. A compromised aggregator may report false aggregation results. Hence, it is essential that techniques are available to allow the querier to verify the integrity of the result returned by the aggregator node. We propose a novel framework for secure information aggregation in sensor networks. By constructing efficient random sampling mechanisms and interactive proofs, we enable the querier to verify that the answer given by the aggregator is a good approximation of the true value, even when the aggregator and a fraction of the sensor nodes are corrupted. In particular, we present efficient protocols for secure computation of the median and average of the measurements, for the estimation of the network size, for finding the minimum and maximum sensor reading, and for random sampling and leader election. Our protocols require only sublinear communication between the aggregator and the user.

01 Jun 2007
TL;DR: This document describes a new kind of "regional registrations", i.e., registrations local to the visited domain, which reduce the number of signaling messages to the home network, and reduce the signaling delay when a mobile node moves from one foreign agent to another within the same visited domain.
Abstract: Using Mobile IP, a mobile node registers with its home agent each time it changes care-of address. This document describes a new kind of "regional registrations", i.e., registrations local to the visited domain. The regional registrations are performed via a new network entity called a Gateway Foreign Agent (GFA) and introduce a layer of hierarchy in the visited domain. Regional registrations reduce the number of signaling messages to the home network, and reduce the signaling delay when a mobile node moves from one foreign agent to another within the same visited domain. This document is an optional extension to the Mobile IPv4 protocol. This memo defines an Experimental Protocol for the Internet community.

Proceedings Article
11 Apr 2007
TL;DR: A long-term study of a subset of a million-plus node coordinate system found that it exhibited some of the problems for which network coordinates are frequently criticized, for example, inaccuracy and fragility in the presence of violations of the triangle inequality.
Abstract: Network coordinates provide a mechanism for selecting and placing servers efficiently in a large distributed system. This approach works well as long as the coordinates continue to accurately reflect network topology. We conducted a long-term study of a subset of a million-plus node coordinate system and found that it exhibited some of the problems for which network coordinates are frequently criticized, for example, inaccuracy and fragility in the presence of violations of the triangle inequality. Fortunately, we show that several simple techniques remedy many of these problems. Using the Azureus BitTorrent network as our testbed, we show that live, large-scale network coordinate systems behave differently than their tame PlanetLab and simulation-based counterparts. We find higher relative errors, more triangle inequality violations, and higher churn. We present and evaluate a number of techniques that, when applied to Azureus, efficiently produce accurate and stable network coordinates.

Proceedings ArticleDOI
06 Nov 2007
TL;DR: LUSTER---Light Under Shrub Thicket for Environmental Research---is a system that meets the challenges of EWSNs using a hierarchical architecture that includes distributed reliable storage, delay-tolerant networking, and deployment time validation techniques.
Abstract: Environmental wireless sensor network (EWSN) systems are deployed in potentially harsh and remote environments where inevitable node and communication failures must be tolerated. LUSTER---Light Under Shrub Thicket for Environmental Research---is a system that meets the challenges of EWSNs using a hierarchical architecture that includes distributed reliable storage, delay-tolerant networking, and deployment time validation techniques.In LUSTER, a fleet of sensors coordinate communications using LiteTDMA, a low-power cluster-based MAC protocol. They measure the complex light environment in thickets and are open to additional ecological parameters, such as temperature and CO2.LUSTER has been deployed and evaluated in laboratory, forested, and barrier island environments. It includes new sensor hardware designs: (a) "SolarDust," a hybrid multichannel energy harvesting and sensing device; (b) "Medusa," a spatially reconfigurable light sensor; (c) a removable SD card storage node; and, (d) in-situ user interface tool for deployment time validation.

Proceedings ArticleDOI
26 Aug 2007
TL;DR: A demonstration of signal processing techniques that enable simultaneous transmission and reception that employ informed-transmittermultiple-input multiple-output (MIMO) links and a combination of adaptive transmit and receive antenna array approaches are exploited.
Abstract: One of the limiting factors in ad hoc wireless mesh networks using traditional physical layer techniques is the inability to transmit and receive at the same frequency simultaneously. As a consequence, careful time-slot or frequency-reuse planning is required. This has adverse network data-rate and latency implications. The focus of this paper is a demonstration of signal processing techniques that enable simultaneous transmission and reception. These techniques employ informed-transmittermultiple-input multiple-output (MIMO) links. A combination of adaptive transmit and receive antenna array approaches is exploited. A number of important types of networking limitations can be resolved given simultaneous transmit and receive technology. The first example is the simultaneous link problem. By employing transmit and receive spatial adaptivity, two links can operate in close proximity using the same frequency at the same time. Another example is the full duplex relay node. Using the same frequency for both links, a given node can simultaneously receive packets from one node while forwarding them to another. For practical systems, two issues dominate performance: channel estimation error, often caused by stale estimates of the channel at the transmitter, and dynamic range limitations of the transmitter and receiver. These issues are investigated. Theoretical, simulated, and experimental results are presented.

Proceedings ArticleDOI
11 May 2007
TL;DR: A probabilistic signature verification scheme that can efficiently detect the tampered messages or the messages from an unauthorized node and describe a scalable role-based access control approach for vehicular networks.
Abstract: We propose a novel group signature based security framework for vehicular communications. Compared to the traditional digital signature scheme, the new scheme achieves authenticity, data integrity, anonymity, and accountability at the same time. Furthermore, we describe a scalable role-based access control approach for vehicular networks. Finally, we present a probabilistic signature verification scheme that can efficiently detect the tampered messages or the messages from an unauthorized node.

Proceedings ArticleDOI
01 May 2007
TL;DR: A novel algorithm for detecting worm-hole attacks in wireless multi-hop networks that uses only connectivity information to look for forbidden substructures in the connectivity graph is proposed, independent of wireless communication models.
Abstract: We propose a novel algorithm for detecting worm-hole attacks in wireless multi-hop networks. The algorithm uses only connectivity information to look for forbidden substructures in the connectivity graph. The proposed approach is completely localized and, unlike many techniques proposed in literature, does not use any special hardware artifact or location information, making the technique universally applicable. The algorithm is independent of wireless communication models. However, knowledge of the model and node distribution helps estimate a parameter used in the algorithm. We present simulation results for three different communication models and two different node distributions, and show that the algorithm is able to detect wormhole attacks with a 100% detection and 0% false alarm probabilities whenever the network is connected with high probability. Even for very low density networks where chances of disconnection is very high, the detection probability remains very high.

Proceedings ArticleDOI
01 May 2007
TL;DR: A fully distributed algorithm is developed that jointly solves the channel-assignment, scheduling and routing problem, and can adapt automatically to the changes in the network topology and offered load, and is provably efficient.
Abstract: The capacity of ad hoc wireless networks can be substantially increased by equipping each network node with multiple radio interfaces that can operate on multiple non-overlapping channels. However, new scheduling, channel-assignment, and routing algorithms are required to fully utilize the increased bandwidth in multi-channel multi-radio ad hoc networks. In this paper, we develop a fully distributed algorithm that jointly solves the channel-assignment, scheduling and routing problem. Our algorithm is an online algorithm, i.e., it does not require prior information on the offered load to the network, and can adapt automatically to the changes in the network topology and offered load. We show that our algorithm is provably efficient. That is, even compared with the optimal centralized and offline algorithm, our proposed distributed algorithm can achieve a provable fraction of the maximum system capacity. Further, the achievable fraction that we can guarantee is larger than that of some other comparable algorithms in the literature.

Proceedings ArticleDOI
27 Aug 2007
TL;DR: Computer simulation using glomosim shows that the proposed protocol provides better performance than the conventional AODV in the presence of Black holes with minimal additional delay and Overhead.
Abstract: An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. It operates without the use of existing infrastructure. One of the principal routing protocols used in ad-hoc networks is AODV (ad-hoc on demand distance vector) protocol. The security of the AODV protocol is compromised by a particular type of attack called 'black hole' attack. In this attack a malicious node advertises itself as having the shortest path to the node whose packets it wants to intercept. To reduce the probability it is proposed to wait and check the replies from all the neighboring nodes to find a safe route. Computer simulation using glomosim shows that our protocol provides better performance than the conventional AODV in the presence of Black holes with minimal additional delay and Overhead.

Journal ArticleDOI
TL;DR: A dynamic-programming-based algorithm for finding the optimal route in an arbitrary network, as well as suboptimal algorithms with polynomial complexity are developed and shown that these algorithms can achieve average energy savings of about in random networks, as compared to the noncooperative schemes.
Abstract: We study the problem of transmission-side diversity and routing in a static wireless network. It is assumed that each node in the network is equipped with a single omnidirectional antenna and that multiple nodes are allowed to coordinate their transmissions in order to obtain energy savings. We derive analytical results for achievable energy savings for both line and grid network topologies. It is shown that the energy savings of and are achievable in line and grid networks with a large number of nodes, respectively. We then develop a dynamic-programming-based algorithm for finding the optimal route in an arbitrary network, as well as suboptimal algorithms with polynomial complexity. We show through simulations that these algorithms can achieve average energy savings of about in random networks, as compared to the noncooperative schemes.