The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose a game-theoretic framework for quality-of-service (QoS) aware resource competition among coexisting wireless links in mobile wireless networks. The senders of wireless links use the constant transmit power and then the wireless resources of interest is characterized by time-slot length. Multiple wireless links will use the limited wireless resources through a time-slot competition game...
In wireless networks, communication links may be subject to random fatal attacks: for example, sensor networks under sudden power losses or cognitive radio networks with unpredictable primary user spectrum occupancy. Under such circumstances, it is critical to quantify how fast and reliably information can be collected over attacked links. In our previous work, we studied such channels by considering...
As the increasing amount of data is collected in mobile wireless networks for emerging pervasive applications, data-centric storage provides energy-efficient data dissemination and organization. One of the approaches in data-centric storage is that the nodes that collected data will transfer their data to other neighboring nodes that store the similar type of data. However, when the nodes are mobile,...
Dynamic spectrum access can enable secondary network users to access unused spectrum, or whitespace, which is found between the transmissions of primary users in a wireless network. The main design objectives for secondary user access strategy are to be able to ??scavenge?? spatio-temporally fragmented whitespace opportunities while limiting the amount of interference caused to the primary users....
The Transmission Control Protocol (TCP) is ubiquitous, sophisticated, and effective. It also prevents the innovation needed to improve delivery of Internet services to the wireless tactical edge of DOD operations. We argue in this paper that TCP should be used as a short-range local access protocol for COTS compatibility rather than as the primary end-to-end transport protocol for the tactical GIG...
A typical military airborne networking scenario involves small groups of relatively closely-spaced aircraft which fly as a unit to perform a common mission. These aircraft need to maintain very long data links with other aircraft in the presence of strong interference from hostile jammers. Due to the physical separation of the aircraft, the time difference of arrival can often be greater than the...
With the increasing size and complexity of emerging military communication networks, low footprint emulation methods are required to evaluate protocols, algorithms and user performance. In this paper we describe a new emulation architecture that is scalable, modular, and responds to real-time changes in topology and link characteristics. We use this scalable emulation testbed to evaluate system performance...
In large networks of nodes with mobility, such as certain tactical wireless networks, overall system behaviors can be difficult to predict given the number of interactions between nodes and the number of possible behavior outcomes. Agent-based modeling is seen as an attractive method for representing and analyzing tactical wireless networks. This paper investigates the use of agent-based models to...
We study the use of node cooperation as a way to improve performance in multiple-source, single-destination wireless networks that use scheduled access as the channel-access method. Unlike many other studies of scheduled access, which are based on the use of a collision channel, we use a physical channel model that incorporates other-user interference, fading, and background noise. The characteristics...
In this paper, we introduce a new denial-of-service attack on wireless networks: low-power, distributed jamming network (DJN). DJN is composed of large number of low-power jamming devices, which are deployed in proximity to the target devices. DJN can cause significant damage to target network performance with high energy efficiency. In the paper, we provide a characterization of DJN, demonstrate...
In wireless networks, the conventional routing approach is to pre-select the next-hop receiver for a packet based on knowledge of the network topology. However, when the nodes experience fading that changes on the order of the packet duration, a conventional routing approach will often offer poor performance because the pre-selected receiver may not be able to recover the packet because of fading...
Cooperative relaying has been proposed as a promising technology to provide reliable high data rate services for future wireless networks. The work presented here focuses on a novel efficient three time-slot approach using rateless codes, opportunistic fountain (OF), for cellular networks with fixed relays. This scheme enjoys benefits from both relay selection and inter-relay cooperation, offering...
The problem of anonymous wireless networking is considered when adversaries who monitor the transmissions in the network are also capable of compromising a fraction of nodes to extract network information. For a given level of network performance, as measured by network throughput, the problem of maximizing anonymity is studied from a game-theoretic perspective. The metric of anonymity considered...
We study the problem of minimum-length scheduling in time-varying, single-hop wireless networks where each source of traffic has a finite amount of data to deliver to its corresponding destination. Our objective is to obtain a joint scheduling and rate control policy that minimizes the overall time required to deliver all the data to its intended destinations. We incorporate the physical layer into...
In this paper, we discuss a novel priority assignment and packetization scheme to transport H.264/AVC video packets over wireless networks. Specifically, we discuss a comprehensive packet priority assignment scheme for unequal error protection, followed by the use of adaptive network abstraction layer unit (NALU) sizes and NALU fragmentation schemes. These schemes use the standard-compliant decoder...
Security in wireless networks is challenging. Security in cognitive radio networks (CRN) is even more challenging. This is because a CRN consists of cognitive radios (CR) which have many more functions and processes to account for, such as sensing, geolocation, spectrum management, access to the policy database etc. Each of these functions and processes need to be assessed for potential vulnerabilities...
We study the impact of different levels of relay cooperation on the throughput of a two-hop amplify-and-forward relaying network, where n single-antenna source-destination pairs communicate through a set of single-antenna relays. We focus on two levels of cooperation among the relay nodes, where the relays share either channel state information (CSI) or both CSI and received signals. The high level...
The current low throughput of wireless ad hoc networks is greatly caused by the inefficiency of spectrum usage. With distributed scheduling/spectrum allocation, better spectrum efficiency can be achieved. However, most distributed algorithms consider the neighbors' traffic independent of each other and ignore the multi-hop nature of flows, leading to the spectrum wastage and inefficiency. By incorporating...
We consider the problem of identifying the insider-based attacks in the form of jammers in a single-hop wireless network, where jammers have the inside knowledge of frequency hopping patterns and any protocols used in the wireless network. We propose a novel technique, called ??alibi??, to identify the insider-based jammers in multi-channel wireless networks. Alibi is a form of defense whereby a defendant...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.