The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Designing energy efficient and reliable routing protocols for mobility centric Wireless Sensor Networks (WSN) applications such as wildlife monitoring, battlefield surveillance and health monitoring is a great challenge since topology of the network changes frequently. Existing cluster-based routing protocols such for LEACH-Mobile, LEACH-Mobile-Enhanced, CBR-Mobile that are designed for mobile sensor...
In most of the applications of wireless sensor networks(WSN), covering the area of interest and delivering the sensed information to the sink are two fundamental functions. Extensive research associated with these two issues, such as energy efficient coverage and delay-constraint routing, can be found in the literature. However, few works combine these two issues together. Considering the fact that...
Anypath routing, a new routing paradigm, has been proposed to improve the performance of wireless networks by exploiting the spatial diversity and broadcast nature of the wireless medium. In this paper, we study the problem of finding an anypath subject to multiple (K) constraints, which has been proved to be NP-hard. We present a polynomial distributed K-approximation routing algorithm. Our algorithm...
Cognitive radio (CR) has been recently proposed as a promising technology to improve the spectrum utilization. In this paper, we consider the spectrum sharing between CR users and a licensed primary user (PU) in order to enhance the spectrum efficiency. In the considered scenario, the PU is located at a far position from the primary base station (PBS) which makes it difficult to obtain a successful...
In this paper, we consider a novel compressed correlation-matching (CCM) approach for spectrum sensing of wideband sparse signals. We derive a general closed-form estimate of the wideband sparse signal level from compressed observations, while providing physical interpretation of the problem. The formulation allows straightforward application to signal processing problems of interest, such as generalized...
Although the conventional duty cycle MAC protocols such as RMAC for wireless sensor networks (WSNs) perform well in aspects of saving energy and reducing end-to-end delivery latency, they are designed independently and require an extra routing protocol in the network layer to provide path information for the MAC layer. We propose a novel cross-layer duty cycle MAC protocol with data forwarding towards...
Opportunistic spectrum access (OSA) is a key technique for the secondary user (SU) in a Cognitive Radio network to transmit over the "spectrum holes" unoccupied by the primary user (PU). Most existing work on the design of OSA has assumed a non-reactive (NR) PU model, i.e., the PU transmission on-off status is independent of the SU access policy, which may not be practical. In this paper,...
Cognitive Radio (CR) networks are emerging as a viable candidate to resolve the conflict between increasing demand for spectrum and spectrum shortage. The essential purpose of a CR network is to improve the network spectrum efficiency, which, however, may not be achieved if a CR network is inappropriately configured. In decentralized overlaid networks, the throughput of the primary network will decrease...
Multiple Input Multiple Output (MIMO) adds a new dimension to be exploited in Cognitive Radio (CR) by simultaneously serving several users. The spatial domain that is added through MIMO is another system resource that has to be optimized, and shared when possible. In the current paper, we present a spatial sharing that is carried out through Zero Forcing beamforming (ZFB). The power consumption in...
In this paper, we investigate Sybil attacks on spectrum allocation in distributed dynamic spectrum access (DSA) networks. Using IEEE 802.11 devices as secondary nodes, we demonstrate the feasibility of mounting Sybil attacks in the cognitive radio testbed, in which the malicious node poses as multiple normal secondary nodes with different identities in order to steal more spectrum bands. We also show...
CA(Carrier aggregation) is one of the most important techniques for LTE-Advanced system because of its capability to support wide bandwidth while achieving backward compatibility. In order to improve performance of control information transmission, cross-carrier scheduling is to be supported, i.e. control information on one CC (Component Carrier) can assign radio resource on another CC. Design of...
We present a novel adaptive physical layer network coding (PLNC) at the relay, called pseudo exclusive-or (PXOR), for LDPC coded two-way relay (TWR) block fading channels. Based on the pairwise check decoding (PCD), the check relationship table generated by the proposed PXOR mapping obtains the same Hamming distances of the PLNC mapped codewords as that of conventional XOR mapping. In the meantime,...
Recent studies have shown that network coding (NC) directly applied at the physical layer -physical layer network coding (PLNC)- is a promising technique for two-way relay channels (TWRC). Unfortunately, to date, most existing PLNC works have mainly addressed cases of time-invariant channels rather than more realistic multipath time-varying wireless channels. To make further progress in understanding...
In this paper we propose a technique called replaceability assessment where, according to the adaptation mechanisms of a certain adapter, it provides a set of condition pairs that determine when one protocol can be replaced by another, and computes a replacement degree that specifies how replaceable two protocols are. The set of condition pairs and the replacement degree are complementary criteria...
Localization in underwater environments has been constrained by the dependencies on the line of sight (LOS) due to the challenging variability's of the environment. This dependency hinders node discovery and ad-hoc formation in underwater networks and limits the performance of routing protocols. Most proposed algorithms in the literature rely on anchor nodes that are at fixed positions to serve as...
Wireless sensor networks have been attracting a great attention due to their wide range of potential applications. However, due to various limitations arising from their inexpensive nature, limited size, weight and ad hoc method of deployment, the power consumption is one of the major constraints in sensor networks. Moreover, it is well known that packet communication dominates the power consumption...
In wireless networks, interference that is generated by undesired transmitters dominantly limits network performance. The correlation of node locations (in mobile or static networks) makes the interference temporally correlated. In this paper, we quantify the temporal correlation of the interference in mobile Poisson networks. More specifically, we obtain closed-form expressions for the interference...
Content-centric networks have been proposed as a new network paradigm that is centered around the distribution of content. A key idea of content-centric networks is to address content by name and to enable nodes in the network to respond to content requests. Most proposals for content-centric networks require a "clean slate" approach and a replacement of today's TCP/IP protocol stack, which...
The performance of spatial multiplexing systems with linear minimum-mean-squared-error receivers is investigated in ad hoc networks. We present new exact closed-form expressions for the outage probability and transmission capacity. These expressions reveal that from a transmission capacity perspective, single-stream transmission is preferable over multi-stream transmission.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.