Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Device-to-device communications aim to enhance service coverage, particularly at cell edges or in black spots within a neighborhood through relaying and forwarding. In this context, each device is free to move independently, and will therefore change its links to other devices frequently due to connectivity issues. During these movements, a device may be requested to forward traffic unrelated to its...
The connectivity in wireless communication is established based on the receiving signal strength, which is affected by distance, interference, noise, mobility, etc. As a result, a node has a limited coverage area. Therefore, the connectivity becomes one of the significant limitations in multi-hop wireless networks. The relaying concept and transmission power control were introduced to overcome the...
The route recovery algorithm is a crucial part of an ad hoc routing protocol. Designing an efficient and fast route recovery mechanism scheme without incurring extra overheads or delays to repair the broken link is a desirable goal for any routing protocol. The route recovery algorithm in reactive routing protocols like AODV occurs only after a link failure is detected. However, we propose a new route...
In this work we investigate the performance of Ad-hoc on-demand distance vector routing (AODV), Dynamic source routing (DSR), Temporary ordered routing (TORA), Optimized link state routing (OLSR) and Geographic routing (GRP) protocols in wireless ad-hoc networks by using OPNET simulation program. In ad-hoc networks consisting of fixed and mobile stations, routing protocols are compared for different...
Intrusion Detection Systems(IDSs) are widely used to detect both known attacks and unknown attacks performed by internal and external attackers in wireless networks. However, challenging issues for developing IDSs in Wireless Mesh Networks (WMNs) are 1) supporting interoperability and 2) handling volatile parameters. In addition, security standards for WMN are still in draft stage, and to protect...
Along with the growth of the Internet of Things (IoT), the number of wireless devices and mobile nodes significantly increases and they are connected among them over wireless links. Many application software and network system software for these wireless devices/mobile nodes are being developing. However, we cannot confirm a wireless connection between the two adjacent devices, the network topology...
Jamming attacks have been a great challenge for the researchers since they can severely damage the Quality of Service (QoS) of Multi-Hop Wireless Networks (MHWNs). Therefore, how to detect and distinguish multiple jamming attacks and thus to restore network service has been a hot topic in recent years. Note that different jamming attacks will cause different network status changes in MHWN. Based on...
Information dissemination protocols for ad-hoc wireless networks frequently use a minimal subset of the available communication links, defining a rooted Broadcast Tree. In this work, we focus on the core challenge of disseminating from one layer to the next one of such tree. We call this problem Layer Dissemination. We study Layer Dissemination under a generalized model of interference, called Affectance...
While assuming the role of Chief Security Officer, Network Security Designer, and Network Security Administrator, the intention of this research was to identify principle elements related to network security and provide an overview of potential threats, vulnerabilities, and countermeasures associated with technology designed to the IEEE 802.11 wireless LAN standard. In addition, fundamental security...
An efficient and fair node scheduling is a big challenge in multihop wireless networks. In this work, we propose a distributed node scheduling algorithm, called Local Voting. The idea comes from the finding that the shortest delivery time or delay is obtained when the load is equalized throughout the network. Simulation results demonstrate that Local Voting achieves better performance in terms of...
In this paper, we study the problem of jointly solving the contention and congestion distributed control problem in a bounded queue wireless ad-hoc network. The resulting flow rates satisfy fairness criteria according to a given Network Utility Maximization (NUM) function. In recent years a number of papers have presented solutions to this problem that are based on network utility maximization algorithms...
With the development of wireless networks, the scale of network optimization problems is growing correspondingly. While algorithms have been designed to reduce complexity in solving these problems under given size, the approach of directly reducing the size of problem has not received much attention. This motivates us to investigate an innovative approach to reduce problem scale while maintaining...
This is a brief reflexion on the life and personality of abeloved colleague, Professor Ivan Stojmenović, who left usin 2014. His achievements, his students, and the scientificand personal relationships he built will impact our community for a long time.
We consider the problem of finding fast techniques to solve jammer placement problems, where the goal is to partition a wireless network and the communication and jamming effects can be modeled using graphs. We have previously developed optimal jammer placement techniques based on solving a binary linear program, but the complexity of the optimal solution is an exponential function of the number of...
To protect confidential communications from eavesdropping attacks in wireless networks, we propose a novel anti-eavesdropping scheme named AE-Shelter. In our proposed scheme, we place a number of friendly jammers at a circular boundary to protect legitimate communications. The jammers sending artificial noise can mitigate the eavesdropping capability of wiretapping the confidential information. We...
We study the problem of serving randomly arriving and delay-sensitive traffic over a multi-channel communication system with time-varying channel states and unknown statistics. This problem deviates from the classical exploration-exploitation setting in that the design and analysis must accommodate the dynamics of packet availability and urgency as well as the cost of each channel use at the time...
We consider the problem of scheduling in wireless networks with the aim of maintaining up-to-date and synchronized (also called, aligned) information at the receiver across multiple flows. This is in contrast to the more conventional approach of scheduling for optimizing long-term performance metrics such as throughput, fairness, or average delay. Maintaining the age of information at a low and roughly...
Mobile crowd sensing has found a variety of applications (e.g., spectrum sensing, environmental monitoring) by leveraging the "wisdom" of a potentially large crowd of mobile users. An important metric of a crowd sensing task is data accuracy, which relies on the qualities of the participating users' data (e.g., users' received SNRs for measuring a transmitter's transmit signal strength)...
We consider network utility maximization problems over heterogeneous cellular networks (HetNets) that permit dual connectivity. Dual connectivity (DC) is a feature that targets emerging practical HetNet deployments that will comprise of non-ideal (higher latency) connections between transmission nodes, and has been recently introduced to the LTE-Advanced standard. DC allows for a user to be simultaneously...
The spread in the use of wireless services resulted in a remarkable growth of power consumption for telecommunication systems to satisfy the continuous growth of data demand. On the other hand, the emergence of smart grids and the expansion of low-cost distributed powering solutions represented an opportunity to enhance the energy efficiency and improve communication systems' costs. In this paper,...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.