The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The cooperative communication makes wireless transmission reliable utilizing special diversity, where the relay selection is one of important issues. In this paper, we propose a relay selection scheme exploiting SNR and success probability of the link between nodes in network, especially focus in the link between the source and the relay. Proposed scheme is compared with previous schemes by the simulation...
As defined in the 3rd Generation Partnership Project specifications, a Universal Mobile Telecommunications System (UMTS) user device has to carry out two authentication steps to access multimedia services in IP Multimedia Subsystem (IMS). The first authentication step is used to gain UMTS General Packet Radio Service (GPRS) network admission. The second authentication step is the IMS authentication...
Nodes in mobile networks are usually unevenly distributed over space. Several dense clusters of nodes are interconnected by a few nodes in sparsely occupied areas. Removing vital nodes along such bridges would partition the network and severely reduce the overall connectivity. Consequently, detecting and protecting those few vital nodes is crucial for keeping the network operational. In order to achieve...
Many trust management systems implicitly assume that the required credentials can be obtained without difficulty. In consequence, it is necessary to have a convenient way to discover desired credentials in the network for successful deployment of trust management systems. Obviously, in distributed environments, this assumption may not be easy to achieve due to failure of different components. In this...
We evaluate the outage probability and the spectral efficiency of cooperative multi-hop networks, where L relay nodes are placed at each hop and an MDS (Maximum Distance Separable) code of coding rate 1/L is employed at the link-layer. A codeword of the MDS code is partitioned into L blocks. When each relay node receives two or more codeword blocks of the MDS code, it aggregates the blocks, corrects...
The use of Wireless Sensor Network (WSN) with IP network in Precission Agriculture (PA) would be an added advantage to existing solutions of PA system. However, existing WSN Technologies, such as Zigbee and other legacy sensor networks are originally design for non IP-based WSN. Hence, they have difficulties in constructing global infrastructure for the precision agriculture. On the other hand, IETF...
Since network coding is very useful for increasing the total throughput in wireless networks, it has recently gained much attention. However, there is few works focusing on network coding in the cyclic topology network, in which six nodes are connected to form a cluster. Considering the case that each node's regional information is required to be exchanged among all the nodes in the cyclic network,...
Rumor Routing is one of the routing algorithm categories in wireless sensor networks which is well extended and optimized in the recent years. Common principal ideas in all rumor routing algorithms are conjunction of query-agents with the traversed path of event information propagator agents in the network. In this paper we propose a new method to reduce the number of routing agents to consequently...
Existing network operator-friendly P2P traffic control techniques like P4P argue that network operators can reduce inter-domain traffic while peer-to-peer (P2P) applications can improve their performance through the traffic localization. However, the existing work has not addressed how the traffic localization affects an intra-domain traffic control in detail. In fact, not considering the impact on...
In most real-life scenarios for Ambient Intelligence, the need arises for scalable simulations that provide reliable sensory data to be used in the preliminary design and test phases. This works present an approach to modeling data generated by a hybrid simulator for wireless sensor networks, where virtual nodes coexist with real ones. We apply our method to real data available from a public repository...
Analytical studies of Medium Access Control (MAC) layer protocols can be used to improve the performance of multi-hop Wireless Sensor Networks (WSNs) in the presence of hidden stations. The selected MAC layer protocol should conform to the distributed nature of the WSNs. The IEEE 802.11 MAC layer with Distributed Coordination Function (DCF) is well suited to WSNs. Analytical studies of IEEE 802.11...
6LoWPAN is for IPv6 packets to be sent to and received from over IEEE 802.15.4 based networks for applications which require wireless internet connectivity at lower data rates for devices. However it is well known that the management of addresses for devices that communicate across the two dissimilar domains of IPv6 and IEEE802.15.4 is complicated. Routing itself is another problem especially between...
In this paper, we deal with a scheduling algorithm to fulfil a qualified end-to-end video service in terms of fairness and energy efficiency over multi-hop wireless sensor networks. For this goal, we explore to optimize the routing and power allocation via cross-layer optimization by utilizing a game-theoretic approach. In order to reduce computational complexity, we also propose a distributed optimization...
In this paper, we propose a new naming system to split an address into separate Identifier and Locator and a network architecture based on our naming concept, in order to support mobility and seamless communication. Also our solution aims to solve the scalability problem as well as provide the way to control the traffic under the multi-homing condition. Our solution consists of three core concepts...
SECMPEG selectively encrypts data to protect MPEG video streams. However, this scheme is inefficient because it encrypts the whole I-frames whose size is relatively larger than B/P-frames. In this paper, we propose a more efficient selective encryption approach which exploits the error propagation property in MPEG2 standard. Our experimental results show that the proposed approach can reduce the execution...
A Mobile Ad Hoc Network (MANET) is a self-configuring network of mobile devices connected by a wireless link. In MANETs, the data packet may fail to be delivered for various reasons including nodes movement, packet collision and bad channel condition. Because re-route recovery of traditional on-demand routing protocols has high latency, several ideas have been proposed to solve this problems. AODV-BR...
The Pulse-Doppler radar (PDR) is an ultrawideband radar system capable of not only detecting target location, but also measuring its radial velocity by using the Doppler Effect. However, the traditional radar signal processing techniques are mismatch with the limit computational and storage resources available on typical wireless sensor mote. In this paper, we explore the compatibility of PDRs and...
According to multimedia service distribution such as High-Definition Television (HDTV), Internet Protocol Television (IPTV) and Voice Over Internet Protocol (VoIP), the networks are required to guarantee Quality of Service (QoS) and real-time performance. Power Line Communication Technology is used for data transfer as well as the transfer of electric power. However, power line communication has some...
The paper studies bandwidth distribution among a set of rational multihomed wireless terminals (WTs). Based on network feedback information (NFI), each WT selects an available wireless network so as to self-optimize a utility derived from received bandwidth. Using game-theoretic tools we show how to disincentivize “aggressive” MAC configuration and quantify the role of the speed of NFI generation...
We present the principles, implementation and evaluation of the SAw-SHARC algorithm, a Stability Aware Sharper Heuristic for Assignment of Robust Communities. The objective of this contribution is to perform distributed detection of densely and reliably interconnected users of a wireless ad hoc network and group them in communities. Community assignment is achieved using the computation of a neighborhood...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.