0000000000082668

AUTHOR

Frank Y. Li

Energy Harvesting-Aware Backoff Algorithms for Distributed Device-to-Device Communication

Due to limited energy capacity in mobile devices, energy harvesting is regarded as a promising technology for lifetime extension in device-to-device (D2D) communication. However, medium access control (MAC) protocols designed for D2D communication intrinsically do not consider the existence of harvested energy. In this paper we study four backoff (BO) algorithms, among which one algorithm is proposed to enhance the BO selection based on energy harvesting rate and residual energy of devices. Simulations are performed in order to assess how the proposed algorithm can extend the lifetime of a D2D communication network as well as to provide fair channel access opportunities among devices.

research product

MAC strategies for single rendezvous multi-hop cognitive radio networks

This paper presents two MAC strategies for multi-hop cognitive radio networks in single radio multi-channel cases. Both strategies use one of the idle multiple channels for communication among secondary users, and the network will leave the current channel and jump to another channel as a group if any primary user appears. The first strategy is based on a pre-defined pattern that will always tune to the next available channel when primary user emerges. The second one is based on the concept of connected dominating set in which a backbone is formed in the network in order to keep the continuity of the communication. The strategies are evaluated in both homogeneous and heterogeneous channels …

research product

Two Teletraffic-based Schemes for Energy Saving in Cellular Networks with Micro-cells

Published version of an article in the journal: Journal of Communications. Also available from the publisher at: http://dx.doi.org/10.4304/jcm.7.10.726-739 Open access The energy consumption of Base Stations (BSs) is known to constitute a major part of the power consumption in a cellular network. In this paper, we propose a novel approach which may switch a BS off under light traffic conditions in order to conserve the power consumption of such networks. More specifically, when the traffic load in the middle cell of a network with three micro-cells is sufficiently low, the corresponding BS can be switched off and its users will be covered by increasing the transmission power of one sector a…

research product

A contention-based multiple access protocol in cooperative wireless networks

Cooperative communication has emerged as a promising technique to enhance system performance in wireless networks. This paper proposes a contention-based cooperative multiple medium access control protocol by means of multiple retransmissions of the same packet from different relay nodes. The proposed scheme exploits cooperative communication capability not only from time diversity derived from multiple temporal transmissions but also spatial diversity derived from distributed multiple relays. A Markov chain is introduced to analyze the throughput performance of the proposed cooperative scheme. The performance evaluation of the protocol is validated and compared with non-cooperative ARQ pro…

research product

Does higher datarate perform better in IEEE 802.11-based multihop ad hoc networks?

Due to the nature that high datarate leads to shorter transmission range, the performance enhancement by high datarate 802.11 WLANs may be degraded when applying high datarate to an 802.11 based multihop ad hoc network. In this paper, we evaluate, through extensive simulations, the performance of multihop ad hoc networks at multiple transmission datarates, in terms of the number of hops between source and destination, throughput, end-to-end delay and packet loss. The study is conducted based on both stationary chain topology and mesh topologies with or without node mobility. From numerical results on network performance based on chain topology, we conclude that there is almost no benefit by…

research product

Achieving Ultra Reliable Communication in 5G Networks: A Dependability Perspective Availability Analysis in the Space Domain

As part of the 5G communication paradigm, ultra reliable communication (URC) is envisaged as an important technology pillar for providing anywhere and anytime services to end users. While most existing studies on reliable communication do not investigate this problem from a dependability theory perspective, those dependability-based studies tend to define reliability merely in the time domain. In this letter, we advocate extending the concept of URC from the dependability perspective also in the space domain . We initiate definitions on cell availability and system availability. The availability and the probability of providing a guaranteed level of availability in a network are analyzed bo…

research product

ACT-MAC: An asynchronous cooperative transmission MAC protocol for WSNs

Duty cycling (DC) has been proven to be an efficient mechanism to reduce energy consumption in wireless sensor networks (WSNs). On the other hand, cooperative transmission (CT) enables longer range transmission to hop over an energy-hole node, resulting in more balanced energy consumption among nodes. In the literature, there exist few CT MAC protocols for DC operated WSNs and these protocols rely on fixed cycle length. In this paper, we propose a novel variable cycle length protocol, namely asynchronous cooperative transmission medium access control (ACT-MAC), which contains both features of reducing the unnecessary idle listening by DC and mitigating the energy-hole by making use of CT. T…

research product

Low-Power Wide-Area Networks for Sustainable IoT

Low-power wide-area (LPWA) networks are attracting extensive attention because of their abilities to offer low-cost and massive connectivity to Internet of Things (IoT) devices distributed over wide geographical areas. This article provides a brief overview on the existing LPWA technologies and useful insights to aid the large-scale deployment of LPWA networks. Particularly, we first review the currently competing candidates of LPWA networks, such as narrowband IoT (NB-IoT) and long range (LoRa), in terms of technical fundamentals and large-scale deployment potential. Then we present two implementation examples on LPWA networks. By analyzing the field-test results, we identify several chall…

research product

Enabling Backoff and Eliminating Redundant Idle Period for Medium Access in LTE-U

To address the burgeoning demand for mobile data, 3GPP is actively studying the capability of operating LTE in the unlicensed band, referred to as LTE-U. One of the main challenges of this approach is to maintain better coexistence between WiFi and LTE-U devices. To enable the coexistence, the listen before talk (LBT) principle has been adopted for LTE-U medium access with two flavors of mechanisms, i.e., load based equipment (LBE) and frame based equipment (FBE) access. In this paper, we consider the FBE mechanism and enhance its performance by introducing a backoff procedure for LTE devices. We investigate the original FBE mechanism defined by 3GPP and the enhanced FBE (E- FBE) mechanism fr…

research product

Enabling Soft Frequency Reuse and Stienen's Cell Partition in Two-Tier Heterogeneous Networks: Cell Deployment and Coverage Analysis

Heterogeneous cellular networks (HetNets) are one of the key enabling technologies for fifth generation (5 G) networks. In HetNets, the use of small base stations (SBSs) inside the coverage area of a macro base station (MBS) offers higher throughput and improved coverage. However, such multi-tier base station deployment introduces new challenges, e.g., (i) All users experience significant inter-cell interference (ICI) due to frequency reuse, (ii) SBS associated users experience severe MBS-interference due to higher MBS transmit power, and (iii) MBS coverage edge users receive lower signal-to-interference ratio (SIR) due to longer distances. To address the aforementioned challenges, this wor…

research product

A novel teletraffic-based power saving scheme for cellular networks with microcells

As the number of network components increases to meet the explosion of mobile devices, power conservation has become an important strategy for network operators. In this paper, we propose a novel teletraffic-based approach to save power consumption of a three-cell microcellular network. When the traffic load in the middle cell is lower than certain threshold, the cell can be switched-off and its users will be covered by increasing the transmission power of one sector antenna in each of the two neighboring cells. Numerical results demonstrate that at a moderate cost of increased antenna transmission power of the two sectors, significant amount of network power can be saved for the whole netw…

research product

Significance of channel failures on network performance in CRNs with reserved spectrum

It is well understood that in wireless networks, channel failures, which are typically caused by equipment or power failures as well as intrinsic features in radio transmissions, such as fading and shadowing, can easily result in network performance degradation. Therefore, fast recovery from channel failures is an important measure that should be incorporated with those networks. Consequently, in a cognitive radio network (CRN), channel failures can cause significant performance degradation in both primary and secondary networks. Instead, retainability, i.e., the capability of providing continuous connection for users must be guaranteed even if a significant network element is disrupted. In…

research product

A TDMA-Based MAC Protocol Supporting Cooperative Communications in Wireless Mesh Networks

This paper proposes a TDMA-based medium access control protocol which enables cooperative communications in multi-hop wireless mesh networks. According to the proposed scheme, each router at the two-hop neighbourhood of each other is allocated to a specific time slot for accommodating either direct or cooperative transmissions in a coordinated manner, controlled by mini-slots which are part of the time slot. Benefiting from the elaborate mini-slot design, channel resources are fairly and efficiently allocated to each router so that no handshake is needed prior to each packet transmission. By providing access priority to cooperative transmission through an optimal relay which is determined b…

research product

Optimization of the Relay Selection Scheme in Cooperative Retransmission Networks

Cooperative MAC protocol design has attracted much attention recently thanks to the development of relaying techniques. In single-relay C-ARQ, the relay selection scheme cannot work efficiently in a dense network, due to high collision probability among different contending relays. In this paper, the throughput performance impairment from the collision is analysed in a typical network scenario. Thereby, we propose an optimized relay selection scheme aiming at maximizing system throughput by reducing collision probability. The throughput performance enhancement by the proposed optimal relay selection scheme is verified by simulations.

research product

A Multi-Phase Decode-and-Forward Transmission Protocol in Cognitive Relay Networks: Outage Analysis and Relay Power Allocation

Consider an underlay cognitive relay network with multiple source and destination pairs and that a decode-and-forward scheme is adopted at the relay. We propose a multi-phase transmission protocol in this paper which involves cooperation among source, relay and destination nodes. Given perfect interference elimination before decoding at the destination nodes, we derive closed-form expressions for outage probability calculation over Rayleigh fading channels. Furthermore, the optimal relay power allocation factor which leads to minimal outage probability is determined. Numerical results reveal the conditions under which satisfactory performance can be achieved based on the proposed scheme.

research product

Channel Occupancy-Based Dynamic Spectrum Leasing in Multichannel CRNs: Strategies and Performance Evaluation

Spectrum leasing has been proposed as an effective approach for enabling more flexible spectrum utilization in CRNs. In CRNs, a primary network (PN) which consists of multiple primary users (PUs) can lease part of the licensed spectrum to secondary users (SUs) in exchange for operational benefits. The focus of this study is to investigate how and to what extent the PN allows spectrum leasing in CRNs, considering the QoS requirements of the PN and the secondary network (SN). Correspondingly, we propose two dynamic spectrum leasing strategies, which can improve the QoS performance of SUs while ensuring sufficient remuneration for PUs. In order to dynamically adjust the portion of leased bandw…

research product

Receiver-Initiated Data Collection in Wake-Up Radio Enabled mIoT Networks: Achieving Collision-Free Transmissions by Hashing and Partitioning

To achieve ultra-low energy consumption and decade-long battery lifetime for Internet of Things (IoT) networks, wake-up radio (WuR) appears as an eminent solution. While keeping devices in deep sleep for most of the time, a WuR enabled IoT device can be woken up for data transmission at any time by a wake-up call (WuC). However, collisions happen among WuCs for transmitter-initiated data reporting and among data packets for receiver-initiated data collection . In this article, we propose three novel hashing-based schemes in order to achieve collision-free data transmissions for receiver-initiated data collection. We consider first a simple scenario where all devices in a region of interest …

research product

Preamble Reservation Based Access for Grouped mMTC Devices with URLLC Requirements

Author's accepted manuscript (postprint). © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Available from 16/07/2021. Ultra-reliable low latency communication (URLLC) and massive machine type communications (mMTC) are two of the three major technological pillars in 5G. For medium access in mMTC scenarios, e.g., smart cities, a major bottleneck for achieving reli…

research product

MDP-based Resource Allocation for Uplink Grant-free Transmissions in 5G New Radio

The diversity of application scenarios in 5G mobile communication networks calls for innovative initial access schemes beyond traditional grant-based approaches. As a novel concept for facilitating small packet transmission and achieving ultra-low latency, grant-free communication is attracting lots of interests in the research community and standardization bodies. However, when a network consists of both grant based and grant-free based end devices, how to allocate slot resources properly between these two categories of devices remains as an unanswered question. In this paper, we propose a Markov decision process based scheme which dynamically allocates grant-free resources based on a spec…

research product

Outage Probability Analysis of User-Centric SBS-Based HCNets Under Hybrid Rician/Rayleigh Fading

To model dense user equipment (UE) distribution in heterogeneous cellular networks (HCNets), the Poisson cluster process (PCP) has emerged as a promising tool. In user-centric HCNets where UEs are distributed according to a PCP around a small base station (SBS), the network performance has been commonly studied in literature under a Rayleigh fading environment assumption. However, such an assumption may not hold in user-centric HCNets given the possible existence of a strong line-of-sight (LOS) link between UEs and BSs due to a relatively short transmission distance. This letter analyzes the performance of user-centric SBS based HCNets by considering that the desired LOS link experiences Ri…

research product

Preamble Transmission Prediction for mMTC Bursty Traffic : A Machine Learning based Approach

The evolution of Internet of things (IoT) towards massive IoT in recent years has stimulated a surge of traffic volume among which a huge amount of traffic is generated in the form of massive machine type communications. Consequently, existing network infrastructure is facing challenges when handling rapidly growing traffic load, especially under bursty traffic conditions which may more often lead to congestion. By proactively predicting the occurrence of congestion, we can implement necessary means and conceivably avoid congestion. In this paper, we propose a machine learning (ML) based model for predicting successful preamble transmissions at a base station and subsequently forecasting th…

research product

Performance of frame transmissions and event-triggered sleeping in duty-cycled WSNs with error-prone wireless links

Abstract Two types of packet transmission schemes are prevalent in duty-cycled wireless sensor networks, i.e., single packet transmission and aggregated packet transmission which integrates multiple packets in one frame. While most existing models are developed based on an error-free channel assumption, this paper evaluates the performance of both transmission schemes under error-prone channel conditions. We develop a four-dimensional discrete-time Markov chain model to investigate the impact of channel impairments on the performance of frame transmissions. Together with tracking the number of packets in the queue, number of retransmissions and number of active nodes, the fourth dimension o…

research product

Energy Efficiency Evaluation of Cellular Networks Based on Spatial Distributions of Traffic Load and Power Consumption

Energy efficiency has gained its significance when service providers' operational costs burden with the rapidly growing data traffic demand in cellular networks. In this paper, we propose an energy efficiency model for Poisson-Voronoi tessellation (PVT) cellular networks considering spatial distributions of traffic load and power consumption. The spatial distributions of traffic load and power consumption are derived for a typical PVT cell, and can be directly extended to the whole PVT cellular network based on the Palm theory. Furthermore, the energy efficiency of PVT cellular networks is evaluated by taking into account traffic load characteristics, wireless channel effects and interferen…

research product

Cooperative communication design with distributed code allocation in a clustered network

A major challenge for cooperative communication in distributed networks is to coordinate relay transmissions without introducing too much overhead. Targeting a clustered network, we propose a novel cooperative communication scheme including channel quality based relay selection and distributed space-time code allocation in this paper. Both analysis and simulations are carried out to investigate the performance of the proposed cooperative scheme, in terms of packet delivery rate, throughput and energy efficiency, under different channel conditions and network density.

research product

Cellular Networks: An Evolution from 1G to 4G

research product

Dynamic Channel Aggregation Strategies in Cognitive Radio Networks with Spectrum Adaptation

In cognitive radio networks, channel aggregation techniques which combine several channels together as one channel have been proposed in many MAC protocols. In this paper, spectrum adaptation is proposed in channel aggregation and two strategies which dynamically adjust channel occupancy of ongoing traffic flows are further developed. The performance of these strategies is evaluated using continuous time Markov chain models. Moreover, models in the quasi-stationary regime are analyzed and the closed-form capacity expression is derived in this regime. Numerical results demonstrate that the capacity of the secondary network can be improved by using channel aggregation with spectrum adaptation.

research product

Cell Association With Load Balancing in Nonuniform Heterogeneous Cellular Networks: Coverage Probability and Rate Analysis

To meet the ever-growing traffic demand and address the cell capacity shortage problem, associating end users to various tiers of cells in a multitier cellular network appears to be a promising approach. In this paper, we consider a nonuniform heterogeneous cellular network (NuHCN) and propose a cell association scheme that selectively mutes certain small-cell base stations (BSs) and covers end users by cell range extension (via cell biasing) for achieving load balancing. The envisaged NuHCN is comprised of two tiers of BSs, i.e., macro- and small-cell BSs, deployed according to three independent homogeneous Poisson point processes for BSs and end users, respectively. Accordingly, the avail…

research product

MAC Protocols for Wake-up Radio: Principles, Modeling and Performance Analysis

[EN] In wake-up radio (WuR) enabled wireless sensor networks (WSNs), a node triggers a data communication at any time instant by sending a wake-up call (WuC) in an on-demand manner. Such wake-up operations eliminate idle listening and overhearing burden for energy consumption in duty-cycled WSNs. Although WuR exhibits its superiority for light traffic, it is inefficient to handle high traffic load in a network. This paper makes an effort towards improving the performance of WuR under diverse load conditions with a twofold contribution. We first propose three protocols that support variable traffic loads by enabling respectively clear channel assessment (CCA), backoff plus CCA, and adaptive …

research product

Channel aggregation with guard-band in D-OFDM based CRNs: Modeling and performance evaluation

Channel aggregation (CA) techniques can offer flexible channel allocation and improve overall system performance in multi-channel cognitive radio networks (CRNs). Although many CA techniques have been proposed and studied, the impact of guard-band on CA for channel access has not been addressed in-depth. In this paper, we study the guard-band allocation mechanisms in discontinuous-orthogonal frequency division multiplexing (D-OFDM) based CRNs, and investigate the impact of guard-band sharing on SU flows when CA is enabled. Continuous time Markov chain (CTMC) based models have been developed in order to investigate the stochastic behavior of PU and SU flows. Based on our mathematical analysi…

research product

An Overview of 5G Slicing Operational Business Models for Internet of Vehicles, Maritime IoT Applications and Connectivity Solutions

Identification of ecosystems and Business Models (BM) is an important starting point for new complex system development. The definition of actor (or stakeholder) roles and their interactions (at both business and technical levels), together with target scenarios and use cases, provide essential input information for further system requirement collection and architecture specification. The powerful and flexible Fifth Generation (5G) network slicing technology, which is capable of creating virtually isolated and logically parallel networks, enables a large range of complex services and vertical applications. Although various terminologies and models have been proposed in recent years for BMs …

research product

Dynamic Spectrum Reservation for CR Networks in the Presence of Channel Failures: Channel Allocation and Reliability Analysis

[EN] Providing channel access opportunities for new service requests and guaranteeing continuous connections for ongoing flows until service completion are two challenges for service provisioning in wireless networks. Channel failures, which are typically caused by hardware and software failures or/and by intrinsic instability in radio transmissions, can easily result in network performance degradation. In cognitive radio networks (CRNs), secondary transmissions are inherently vulnerable to connection breaks due to licensed users' arrivals as well as channel failures. To explore the advantages of channel reservation on performance improvement in error-prone channels, we propose and analyze …

research product

Link adaptation with combined optimal frame size and rate selection in error-prone 802.11n networks

In error-prone channel with low SNRs, the network throughput may drop significantly if the packet length becomes too large. On the other hand, too much protocol overhead will be introduced if the packet length is too small. In this paper, we study this tradeoff and propose an adaptive frame size algorithm for A-MPDU in 802.11n networks, which can maximize the throughput by selecting the optimized frame length under different channel conditions. When used together with rate selection, the network throughput can be further improved. Both analytical model and simulation results are presented, demonstrating that our algorithm outperforms the fixed length transmission scheme in 802.11n networks …

research product

Security in Mobile Wireless Sensor Networks – A Survey

Published version of an article in the journal: Journal of Communications. Also available from the publisher at: http://dx.doi.org/10.4304/jcm.6.2.128-142. OA Thanks to recent advances in robotics, sensors and wireless communications, it is feasible to develop a variety of new architectures for Mobile Wireless Sensor Networks (MWSNs) that play an important role in various applications such as battlefield surveillance, harbor monitoring, etc. However, due to the dynamic of mobile network topology in MWSNs, many new security challenges have emerged. In this article, we give a survey on the state of the art technologies in security aspects of MWSNs. We review existing work that provides securi…

research product

C<sup>2</sup>SMA/CA: Enabling co-channel concurrency in WLANs using positional information

An attractive approach to overcome capacity limitations in a densely deployed WLAN environment is to enable transmission concurrency. In this paper, we propose a co-channel concurrent transmission scheme, referred to as C2SMA/CA, which determines whether to allow multiple concurrent transmissions based on interference estimation using positional information. A distributed multi-link concurrency scheduling algorithm is implemented, and its performance is evaluated through extensive simulations.

research product

Distance-related energy consumption analysis for mobile/relay stations in heterogeneous wireless networks

While the availability of more than one mobile or wireless technologies is enhancing the ubiquity of the Internet access, the corresponding energy consumption effects on mobile station battery for connection selection has not been investigated in depth yet. In this paper, a heterogeneous wireless network, which consists of three constituent networks, is studied with respect to the amount of data communicated and the battery operation time. Four alternative hybrid paths for separate uplink and downlink traffic, each involving more than one network, are analyzed with respect to energy consumption aspects of the mobile (and relay) station. The energy in these paths is analyzed mainly by consid…

research product

Priority-oriented multicast transmission schemes for heterogeneous traffic in WSNs

To ensure quality of service (QoS) for heterogeneous traffic in IEEE 802.15.4 based wireless sensor networks (WSNs) is a challenging task since no traffic prioritization mechanism is defined in such WSNs. In this paper, we propose two priority-oriented multicast transmission schemes to provide QoS for heterogeneous traffic in WSNs. Contrary to the legacy CSMA/CA and FIFO principles, these schemes differentiate self-generated or received traffic and give priority to delay-sensitive traffic with respect to channel access and packet scheduling. Simulations are performed in order to assess the performance of these schemes in terms of end-to-end delay, energy consumption, packet delivery ratio, …

research product

Performance evaluation of three dynamic channel access strategies for spectrum leasing in CRNs

Spectrum leasing in cognitive radio networks (CRNs) allows the primary network (PN) to lease a certain fraction of its licensed bandwidth to the secondary network (SN). The motivation for such a concept is to enhance the performance of SNs while improving channel utilization. Meanwhile, the license owners of the channels can also gain benefits through spectrum leasing in terms of either monetary rewards or cooperative communications. In this paper, we propose three dynamic channel access strategies for spectrum leasing in multi-channel CRNs. A common characteristic of all these strategies is that the priority for channel access over the leased spectrum is given to SNs and the unleased spect…

research product

LCRT: A ToA Based Mobile Terminal Localization Algorithm in NLOS Environment

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/VETECS.2009.5073644 Non line-of-sight (NLOS) propagation in range measurement is a key problem for mobile terminal localization. This paper proposes a low computational residual test (LCRT) algorithm that can identify the number of line-of-sight (LOS) transmissions and reduce the computational com…

research product

An On-Demand Energy Requesting Scheme for Wireless Energy Harvesting Powered IoT Networks

Energy harvesting (EH) delivers a unique technique for replenishing batteries in Internet of Things (IoT) devices. Equipped with an energy harvesting accessory, EH-enabled sensor nodes/IoT devices ...

research product

Modeling and Performance Analysis of Energy Efficiency Binary Power Control in MIMO-OFDM Wireless Communication Systems

Published version of an article in the journal:International Journal of Distributed Sensor Networks. Also available from Hindawi Publishing: http://dx.doi.org/10.1155/2011/946258 The energy efficiency optimization of the binary power control scheme for MIMO-OFDM wireless communication systems is formulated, and then a global optimization solution of power allocation is derived. Furthermore, a new energy efficiency binary power control (EEBPC) algorithm is designed to improve the energy efficiency of MIMO-OFDM wireless communication systems. Simulation results show that the EEBPC algorithm has better energy efficiency and spectrum efficiency than the average power control algorithm in MIMO-O…

research product

Energy consumption and optimal relay node placement for cooperative retransmissions

Previous work on cooperative MAC design has shown significant performance improvement in terms of throughput and packet delivery ratio. However, little attention has been paid to extra energy cost at the relay node in order to achieve such benefit. In this paper, we focus on analyzing energy consumption at a relay node in cooperative retransmission networks with mixed Rayleigh and Rician fading channels. Furthermore, optimal relay location is studied with respect to energy efficiency in different scenarios. The simulation and calculation results coincide with each other, both showing the optimal location of the relay node is scenario-dependent and can be obtained under given channel conditi…

research product

Two novel subjective logic-based in-network data processing schemes in wireless sensor networks

Wireless sensor networks (WSNs) consist of connected low-cost and small-size sensor nodes. The sensor nodes are characterized by various limitations, such as energy availability, processing power, and storage capacity. Typically, nodes collect data from an environment and transmit the raw or processed data to a sink. However, the collected data contains often redundant information. An in-network processing scheme attempts to eliminate or reduce such redundancy in sensed data. In this paper, we propose two in-network data processing schemes for WSNs, which are built based on a lightweight algebra for data processing. The schemes bring also benefits like decreased network traffic load and inc…

research product

Complexity analysis of spectrum access strategies with channel aggregation in CR networks

Cognitive radio has been introduced to increase spectrum utilization efficiency. To further improve bandwidth utilization of cognitive radio users, channel aggregation (CA) techniques can be adopted for spectrum access. In this paper, we analyze the complexity of three CA strategies, in terms of required amount of handshakes for channel adaptation due to primary and secondary user activities. Continuous time Markov chain models are developed to evaluate the total number of handshakes required per unit time by different CA strategies and the analytical results are validated by simulations. Numerical results reveal that the complexity of CA strategies depends on the capability and the design …

research product

Reducing Overhearing Energy in Wake-Up Radio-Enabled WPANs: Scheme and Performance

Wake-up Radio (WuR)-enabled wireless personal area networks (WPANs) are more popular over conventional WPANs thanks to WuR's on-demand transmission feature and overwhelming energy consumption superiority. In a WuRenabled WPAN, overhearing occurs when a wake-up receiver decodes and validates the address of a wake-up call which is not intended to it. However, such overhearing consumes a portion of the required reception energy for unintended nodes. To diminish overhearing thus conserve total reception energy in a network, we propose a bit-by-bit address decoding (BBAD) scheme and compare it with another addressing scheme for WuR that uses a micro-controller unit to decode and match the whole …

research product

A continuous-space analytical approach for relay node placement in hybrid cellular and ad hoc networks

A hybrid network is composed of a cellular component and an ad hoc component connected by a relay node, for the purpose of coverage extension and/or capacity improvement. In this paper, we analyze the capacity of such a hybrid network by employing a continuous-space analytical methodology based on circular geometry for uniformly distributed nodes. To achieve maximal overall capacity, the relay node needs to be placed in an optimum location between the base station and the mobile station located at the boundary of the hybrid network. Numerical results show that for obtaining the optimum overall capacity for the hybrid network, the placement of the relay node should be in a range which is nei…

research product

Secure and efficient data storage in unattended wireless sensor networks

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/NTMS.2009.5384753 Providing forward and backward secrecy is still a big challenge in Unattended Wireless Sensor Networks (UWSNs), though some storage schemes have been proposed. Additionally, high storage requirement needs efficient storage techniques. In this paper, we propose a novel homomorphic…

research product

Energy Harvesting Powered Packet Transmissions in Duty-Cycled WSNs: A DTMC Analysis

Energy harvesting (EH) promises an extended lifetime for wireless sensor networks (WSNs), supplying sensor nodes with accumulated energy from natural sources. Different from battery powered sensors, nodes in EH-enabled WSNs are equipped with an energy harvesting accessory in order to extract energy from surrounding sources. Based upon the harvested energy, sensor nodes perform data exchange activities. In this paper, we develop two discrete time Markov chain (DTMC) models to analyze the performance of packet transmissions in such a WSN while employing a generic synchronous medium access control (MAC) protocol. Using the proposed DTMC models, we investigate the effect of EH over a specific s…

research product

Throughput and energy efficiency comparison of one-hop, two-hop, virtual relay and cooperative retransmission schemes

Two main types of approaches exist for implementing cooperative communications at the MAC layer: virtual-hop relay and cooperative retransmission. While the virtual-hop relay schemes employ relay nodes to forward packets when higher end-to-end throughput can be achieved compared with the direct transmission, the cooperative retransmission schemes use relays to retransmit data only after the direct transmission fails. However, the performance of the these different approaches has not been compared in the literature, especially when energy efficiency is considered. In order to find out the best transmission scheme, this paper evaluates and compares the performance of the one-hop direct transm…

research product

A Scheme for Secure and Reliable Distributed Data Storage in Unattended WSNs

Unattended Wireless Sensor Networks (UWSNs) operated in hostile environments face a risk on data security due to the absence of real-time communication between sensors and sinks, which imposes sensors to accumulate data till the next visit of a mobile sink to off-load the data. Thus, how to ensure forward secrecy, backward secrecy and reliability of the accumulated data is a great challenge. For example, if a sensor is compromised, pre-compromise data accumulated in the sensor is exposed to access. In addition, by holding key secrecy of the compromised sensor, attackers also can learn post-compromise data in the sensor. Furthermore, in practical UWSNs, once sensors stop working for accident…

research product

Evaluation and improvement of collective flooding in WSNs with various link correlations

One of the main challenges confronted by wireless sensor networks (WSNs) is to reduce energy consumption of nodes for the purpose of network lifetime extension. In the literature, many backbone based protocols such as connected dominating set (CDS) and broadcast or multicast based protocols are employed in order to improve network performance in terms of metrics like energy consumption, number of transmissions and dissemination delay. In this paper, we evaluate the performance of a recently proposed transmission protocol known as collective flooding (CF), which is based on link correlation, under various link correlation conditions. Through simulations and analyses we demonstrate that altho…

research product

Service discovery protocols in D2D-enabled cellular networks: Reactive versus proactive

Device-to-Device (D2D) communication, which allows access services offered by nearby devices bypassing the base station, has been regarded as an essential component of the emerging 5G mobile networks. Many advantages can be provided by this direct communication paradigm such as high data rate, traffic offloading, range extension, as well as proximity services and social networking. In such a context, service discovery approaches need to be investigated. In this paper, we propose two protocols for service discovery, namely, reactive (pull) discovery and proactive (push) discovery in infrastructure-coordinated D2D networks. The protocol overhead is calculated and numerical results are provide…

research product

Hidden Markov Model Based Machine Learning for mMTC Device Cell Association in 5G Networks

Massive machine-type communication (mMTC) is expected to play a pivotal role in emerging 5G networks. Considering the dense deployment of small cells and the existence of heterogeneous cells, an MTC device can discover multiple cells for association. Under traditional cell association mechanisms, MTC devices are typically associated with an eNodeB with highest signal strength. However, the selected eNodeB may not be able to handle mMTC requests due to network congestion and overload. Therefore, reliable cell association would provide a smarter solution to facilitate mMTC connections. To enable such a solution, a hidden Markov model (HMM) based machine learning (ML) technique is proposed in …

research product

Spectrum Occupancy and Residual Service Analysis in CRNs Using a Multi-Server Queueing Model

Cognitive radio technology enables secondary users (SUs) to opportunistically access the unused or sparsely utilized spectrum by primary users (PUs) without causing any harmful interference to PUs. Consequently, spectrum occupancy modeling appears as an essential task in cognitive radio networks (CRNs). In this paper, we model spectrum occupancy using a queueing theory based approach in order to evaluate the performance of CRNs in terms of network capacity and number of cognitive radio users waiting for services etc. The queue adopted in this model has variable service capacity and can be considered as a multi-service queue with server failure where each channel acts as a server. When a cha…

research product

A Multi-Relay Cooperative Automatic Repeat Request Protocol in Wireless Networks

This paper proposes a Multi-relay Cooperative Automatic Repeat ReQuest protocol (MC-ARQ) for IEEE 802.11 based wireless networks. The proposed distributed relay selection scheme not only selects the best relays but also solves the collision problem among multiple contending relays, by sorting the relays in the network according to their instantaneous channel quality with the destination node. No prior information or explicit signaling among relay nodes is required. Both analytical and simulation results show that significant benefits can be achieved with the MC-ARQ protocol, compared with both the recently proposed PRCSMA scheme and the original non-cooperative DCF scheme.

research product

Distributed routing and channel allocation in multi-channel multi-hop ad hoc networks

In this paper, we propose a novel routing protocol which is integrated with channel assignment for multi-channel multi-hop wireless ad hoc networks. In such a network, each node is equipped with three transceivers. One is always tuned on a control channel which is responsible for control and broadcast messages, and the other two perform as transmitter and receiver respectively for traffic flows on different data channels. The routing protocol works in an on-demand manner, and the proposed routing discovery process selects a path that potentially traverses nodes with lighter traffic load and lower number of carried flows. With a given number of non-overlapping channels, the optimal solution …

research product

EECDC-MAC: An energy efficient cooperative duty cycle MAC protocol

In this paper, we propose a novel energy efficient cooperative duty cycle MAC (EECDC-MAC) protocol in which sensor nodes use fixed wakeup rendezvous scheduling to exchange messages and a cooperative transmission mechanism to avoid overuse of nodes with lower residual energy. Numerical results demonstrate that the EECDC-MAC protocol can prolong the entire network longevity efficiently in comparison with an existing cooperative duty cycle MAC protocol, CDC-MAC, and another popular duty cycle MAC protocol, prediction wakeup MAC (PW-MAC) protocol.

research product

Time-Space Domain Availability Analysis Under Reliability Impairments

Availability and reliability are two essential metrics for the design, deployment, and operation of future ultra-reliable low latency communication (URLLC) networks. Despite a vast amount of research efforts toward URLLC, very little attention has been made on the ultra-reliable communication (URC) aspect of URLLC from a dependability perspective. As an effort toward achieving anytime and anywhere communication, this letter consolidates a dependability theory-based availability concept for individual users by taking into account reliability impairments that affect URC in both spatial and temporal domains . To this end, we perform per-user availability analysis by considering channel status …

research product

Frame Based Equipment Medium Access in LTE-U: Mechanism Enhancements and DTMC Modeling

To address the challenge of ever-growing data rate demand and benefit from the popularity of WiFi capability in mobile phones, 3GPP is studying techniques which enable the coexistence of WiFi and LTE in the unlicensed band, known as LTEU. Two flavors of the listen before talk (LBT) principle, referred to as load based equipment (LBE) and frame based equipment (FBE), are recommended by 3GPP. In this paper, we investigate two enhanced FBE mechanisms, i.e., 1) enhanced FBE (E-FBE); and 2) backoff and idle time reduction FBE (BITR-FBE) for the purpose of improving FBE. After presenting the idea of E-FBE, we propose BITR-FBE which can further improve throughput, shorten delay and reduce energy c…

research product

Energy Efficient Consecutive Packet Transmissions in Receiver-Initiated Wake-Up Radio Enabled WSNs

In wake-up radio (WuR)-enabled wireless sensor networks, data communication among nodes is triggered in an on-demand manner, by either a sender or a receiver. For receiver-initiated WuR (RI-WuR), a receiving node wakes up sending nodes through a wake-up call. Correspondingly sending nodes transmit packets in a traditional way by competing with one another multiple times in a single operational cycle. In this paper, we propose a receiver-initiated consecutive packet transmission WuR (RI-CPT-WuR) medium access control (MAC) protocol, which eliminates multiple competitions to achieve higher energy efficiency. Furthermore, we develop two associated discrete time Markov chains (DTMCs) for evalua…

research product

A Stochastic Routing Algorithm for Distributed IoT with Unreliable Wireless Links

Punctual and reliable transmission of collected information is indispensable for many Internet of Things (IoT) applications. Such applications rely on IoT devices operating over wireless communication links which are intrinsically unreliable. Consequently to improve packet delivery success while reducing delivery delay is a challenging task for data transmission in the IoT. In this paper, we propose an improved distributed stochastic routing algorithm to increase packet delivery ratio and decrease delivery delay in IoT with unreliable communication links. We adopt the concept of absorbing Markov chain to model the network and evaluate the expected delivery ratio and expected delivery delay …

research product

Enabling Retransmissions for Achieving Reliable Multicast Communications in WSNs

To ensure end-to-end reliable multicast or broadcast transmissions in IEEE 802.15.4 based wireless sensor networks WSNs) is a challenging task since no retransmission and acknowledgment mechanisms are defined in such WSNs. In this paper, we propose three retransmission enabled multicast transmission schemes in order to achieve reliable packet transmissions in such networks. Different from the legacy CSMA/CA principle, these schemes allow a sending or forwarding node to retransmit a packet if necessary and enable implicit or/and explicit acknowledgment for multicast services. Simulations are performed in order to assess the performance of these schemes in terms of number of retransmissions, …

research product

Power allocation in multi-channel cognitive radio networks with channel assembling

Accepted version of a paper in the book: 2011 IEEE 12th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). Published version available from the IEEE:http://dx.doi.org/10.1109/SPAWC.2011.5990485 Consider power allocation for Secondary User (SU) packet transmissions over multiple channels with variable Primary User (PU) arrival rates in cognitive radio networks. Two problems are studied in this paper: The first one is to minimize the collision probability with PUs and the second one is to maximize the data rate while keeping the collision probability bounded. It is shown that the optimal solution for the first problem is to allocate all power onto the bes…

research product

An optimal energy efficient cooperative retransmission MAC scheme in wireless networks

While the benefits of cooperative diversity have been well studied in the literature, cooperative MAC protocol design has also attracted much attention recently. In the single-relay Cooperative Automatic Repeat reQuest (C-ARQ) protocol, the best relay node is selected in a distributed manner by relays using different backoff time before packet retransmission. However, this relay selection scheme does not work efficiently in a dense network scenario, due to possible high collision probability among different contending relays. In this paper, we propose an optimized relay selection scheme to maximize system energy efficiency by reducing collision probability. The energy efficiency performance…

research product

Event-Triggered Sleeping for Synchronous DC MAC IN WSNs: Mechanism and DTMC Modeling

Overhearing and idle listening are two primary sources for unnecessary energy consumption in wireless sensor networks. Although introducing duty cycling in medium access control (MAC) reduces idle listening, it cannot avoid overhearing in a network with multiple contending nodes. In this paper, we propose an event-triggered sleeping (ETS) mechanism for synchronous duty-cycled (DC) MAC protocols in order to avoid overhearing when a node is not active. This ETS mechanism applies to any synchronous DC MAC protocols and makes them more energy efficient. Furthermore, we develop a two dimensional discrete time Markov chain model to evaluate the performance of the proposed ETS mechanism by integra…

research product

Enabling early sleeping and early data transmission in wake-up radio-enabled IoT networks

Abstract Wireless sensor networks (WSNs) are one of the key enabling technologies for the Internet of things (IoT). In such networks, wake-up radio (WuR) is gaining its popularity thanks to its on-demand transmission feature and overwhelming energy consumption superiority. Despite this advantage, overhearing still occurs when a wake-up receiver decodes the address of a wake-up call (WuC) which is not intended to it, causing a certain amount of extra energy waste in the network. Moreover, long latency may occur due to WuC address decoding since WuCs are transmitted at a very low data rate. In this paper, we propose two schemes, i.e., early sleeping (ES) and early data transmission (EDT), to …

research product

A service-oriented routing scheme with load balancing in wireless mesh networks

Wireless mesh networks will play an important role in the next-generation wireless communication systems as it can provide wide coverage and scalable broadband Internet access services. However, congestion in such networks may lead to throughput degradation, packet loss and longer transmission delay. Therefore, routing and traffic forwarding schemes which are aware of the congestion status of a wireless network can efficiently improve network performance. In this paper, we propose a new congestion-aware routing scheme which may direct different paths for different services types, according to network congestion status. The goal of this routing scheme is to use traffic load metric for choosi…

research product

A system-level power saving approach for cellular networks with microcells/picocells

Network power consumption reduction has recently become an active research topic. In this paper, we propose a novel approach to save power consumption of a three-cell microcellular network. When the traffic load in the middle cell is low, it can be switched-off and its users are covered. This is enabled by increasing the transmission power of one sector antenna in the two neighboring cells. Numerical results show that by increasing antenna transmission power of the two sectors, the overall network power consumption can be reduced.

research product

Does Wake-Up Radio Always Consume Lower Energy Than Duty-Cycled Protocols?

Many recent studies anticipate that wake-up radio (WuR) will replace traditional duty-cycled (DC) protocols given its overwhelming performance superiority on energy consumption. Meanwhile, the question on whether WuR performs always better than DC protocols has not been answered explicitly. In this paper, we investigate in-depth the energy consumption performance of WuR by considering various levels of traffic load in a wireless sensor network. By comparing SCM-WuR with both synchronous MAC (S-MAC) and asynchronous MAC (X-MAC), we ascertain that SCM-WuR does consume orders of magnitude lowerenergythanDCprotocolswhentrafficloadislow.Howe ver, our numerical results reveal at the same time that …

research product

Per-user availability for ultra-reliable communication in 5G: Concept and analysis

Emerging 5G mobile networks envisage ultra-reliable communication (URC) as one of the major requirements for anytime anywhere communication. Although URC has recently attracted a lot of attention in the research community, existing work seems to rely on approaching reliability merely from a time domain perspective. However, both time and space domain parameters affect reliability and need to be investigated. This paper introduces a dependability theory based definition for per-user availability targeted at 5G networks. The advocated definition promotes both space and time domain components for URC provisioning. Furthermore, we perform reliability and availability analysis and simulations co…

research product

Aggregated Packet Transmission in Duty-Cycled WSNs: Modeling and Performance Evaluation

[EN] Duty cycling (DC) is a popular technique for energy conservation in wireless sensor networks (WSNs) that allows nodes to wake up and sleep periodically. Typically, a single-packet transmission (SPT) occurs per cycle, leading to possibly long delay. With aggregated packet transmission (APT), nodes transmit a batch of packets in a single cycle. The potential benefits brought by an APT scheme include shorter delay, higher throughput, and higher energy efficiency. In the literature, different analytical models have been proposed to evaluate the performance of SPT schemes. However, no analytical models for the APT mode on synchronous DC medium access control (MAC) mechanisms exist. In this …

research product

Priority Enabled Grant-Free Access With Dynamic Slot Allocation for Heterogeneous mMTC Traffic in 5G NR Networks

Although grant-based mechanisms have been a predominant approach for wireless access for years, the additional latency required for initial handshake message exchange and the extra control overhead for packet transmissions have stimulated the emergence of grant-free (GF) transmission. GF access provides a promising mechanism for carrying low and moderate traffic with small data and fits especially well for massive machine type communications (mMTC) applications. Despite a surge of interest in GF access, how to handle heterogeneous mMTC traffic based on GF mechanisms has not been investigated in depth. In this paper, we propose a priority enabled GF access scheme which performs dynamic slot …

research product

Enable concurrent transmissions with beamforming for broadband wireless access in CSMA/CA-based WLANs

In CSMA/CA based wireless local networks, two stations are not allowed to transmit at the same time due to interference generated to each other, resulting in degraded throughput. Concurrent transmission, which enables simultaneous transmission of two or more stations under certain conditions, is able to overcome this problem, leading to enhanced channel utilization efficiency. Different from earlier work on this topic which focuses on omni-direction concurrent transmission, we introduce in this paper beamforming into a co-channel concurrent transmission scheme and investigate the benefits of concurrency with beamforming. The circumstances for concurrent transmission and frame scheduling are…

research product

An Efficient, Robust, and Scalable Trust Management Scheme for Unattended Wireless Sensor Networks

Unattended Wireless Sensor Networks (UWSNs) are characterized by long periods of disconnected operation and fixed or irregular intervals between visits by the sink. The absence of an online trusted third party, i.e., an on-site sink, makes existing trust management schemes used in legacy wireless sensor networks not applicable to UWSNs directly. In this paper, we propose a trust management scheme for UWSNs to provide efficient, robust and scalable trust data storage. For trust data storage, we employ geographic hash table to efficiently identify data storage nodes and to significantly reduce storage cost. We demonstrate, through detailed analyses and extensive simulations, that the proposed…

research product

Broadband Internet Access via Multi-Hop Wireless Mesh Networks: Design, Protocol and Experiments

Published version of an article from the journal: Wireless Personal Communications. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s11277-009-9907-9 While bandwidth for Internet access in urban areas is steadily increasing in recent years, many rural areas are still suffering from the effect of the digital divide. This paper presents a broadband Internet access paradigm developed in the context of the ADHOCSYS project, which was financed by the European Commission under the 6th Framework Program Information and Society Technologies, within the strategic objective of Broadband for All. Aiming at providing reliable Internet access in rural and mountainous regi…

research product

Energy-Efficient Binary Power Control with Bit Error Rate Constraint in MIMO-OFDM Wireless Communication Systems

Motivated by the demand for energy efficiency improvement in mobile communication industry, we explore an idea of optimizing energy efficiency for MIMO-OFDM wireless communication systems while maintaining users' quality of service (QoS) requirement. Based on the binary power control scheme,a power allocation criterion for energy efficiency optimization is derived under the total power constraint. From a bit error rate (BER) point of view, a protection constraint is configured to guarantee the system QoS. With the aim of energy efficiency optimization under QoS guarantee in MIMO-OFDM wireless communication systems, an energy-efficient binary power control with BER constraint (EBPCB) algorith…

research product

Cell Association for MTC Devices in 5G Networks: Schemes and Performance Evaluation

Fifth generation (5G) networks offer tremendous opportunities for Internet of things applications by facilitating massive machine-type communications (MTC). As many MTC devices are battery powered and intend to stay often in the sleep or power-saving mode, cell (re)association needs to be performed when a device wakes up. On the other hand, 5G networks are usually deployed as heterogeneous networks consisting of both macro and small cells under which a single device may be covered by multiple radio access technologies (RATs) simultaneously. Therefore, it is imperative to design effective cell association schemes for the purpose of efficient connectivity and resource utilization, especially …

research product

Cooperative Medium Access Control in Wireless Networks: The Two-Hop Case

Cooperative communication has been recently proposed as a powerful means to improve network performance in wireless networks. However, most existing work focuses solely on one-hop source-destination cooperation. In this paper, we propose a novel cooperative MAC mechanism that is specially designed for two-hop cooperation communications where the source node and the destination node cannot hear each other directly. In this case, cooperative communication is operated in a two-hop manner and transmit-diversity is achieved by the reception of the same data packet forwarded through multiple relays towards a single destination. The proposed scheme employs an efficient relay selection algorithm to…

research product

Priority-based initial access for URLLC traffic in massive IoT networks: Schemes and performance analysis

Abstract At a density of one million devices per square kilometer, the10’s of billions of devices, objects, and machines that form a massive Internet of things (mIoT) require ubiquitous connectivity. Among a massive number of IoT devices, a portion of them require ultra-reliable low latency communication (URLLC) provided via fifth generation (5G) networks, bringing many new challenges due to the stringent service requirements. Albeit a surge of research efforts on URLLC and mIoT, access mechanisms which include both URLLC and massive machine type communications (mMTC) have not yet been investigated in-depth. In this paper, we propose three novel schemes to facilitate priority-based initial …

research product

DTMC modeling for performance evaluation of DW-MAC in wireless sensor networks

Synchronized duty cycling (DC) aligns sensor nodes to wake up at the same time in order to reduce idle listening for medium access control (MAC) in wireless sensor networks (WSNs). Demand wakeup MAC (DW-MAC) is a popular synchronous DC MAC protocol which allows nodes to compete and transmit multiple packets in one operational cycle. This multiple packet transmission (MPT) feature makes DW-MAC more energy efficient when comparing with other existing single time competition based protocols such as sensor MAC (S-MAC). In the literature, no analytical model exists to evaluate the performance of DW-MAC. In this paper, we develop two associated discrete time Markov chain (DTMC) models and incorpo…

research product

Cooperative or non-cooperative transmission in synchronous DC WSNs: A DTMC-based approach

Cooperative transmission (CT) enables balanced energy consumption among sensor nodes and mitigates the energy hole problem in wireless sensor networks (WSNs). In typical CT enabled medium access control (MAC) protocols, a source node decides to trigger CT or not based on a residual energy comparison between itself and its relay node. In this paper, we propose a receiver initiated CT MAC protocol, in which the receiving node makes the decision on initiating CT or not based on a tradeoff between performing CT and non-CT. In this way, nodes can avoid idle listening and achieve an extended lifetime. A discrete-time Markov chain (DTMC) model is developed to analyze the performance of CT associat…

research product

Ultra-Low Power Wake-up Radio for 5G IoT

5G Internet of Things (5G IoT), which is currently under development by 3GPP, paves the way for connecting diverse categories of devices to the IoT via cellular networks. For battery-powered low-cost IoT devices, wake-up radio (WuR) appears as an eminent technique for prolonging the lifetime of such devices, thanks to its outstanding energy consumption performance. However, only some small-size battery-powered IoT devices are able to transmit to a cellular IoT base station (BS) directly. In this article, we present W2B-IoT, a prototype implementation of a WuR-based two-tier system, which bridges cellular IoT BS and WuR via a Bluetooth low energy (BLE)-enabled Android smartphone. Such a WuR-…

research product

Modeling and Performance Analysis of Channel Assembling in Multichannel Cognitive Radio Networks With Spectrum Adaptation

[EN] To accommodate spectrum access in multichannel cognitive radio networks (CRNs), the channel-assembling technique, which combines several channels together as one channel, has been proposed in many medium access control (MAC) protocols. However, analytical models for CRNs enabled with this technique have not been thoroughly investigated. In this paper, two representative channel-assembling strategies that consider spectrum adaptation and heterogeneous traffic are proposed, and the performance of these strategies is evaluated based on the proposed continuous-time Markov chain (CTMC) models. Moreover, approximations of these models in the quasistationary regime are analyzed, and closed-fo…

research product

Performance Analysis of Synchronous Duty-Cycled MAC Protocols

In this letter, we propose an analytical model to evaluate the performance of the S-MAC protocol. The proposed model improves the accuracy of previous models in two aspects. First, it incorporates the dependence among the nodes within a cluster by defining a DTMC that models the number of active nodes, whereas the previous models considered that nodes were mutually independent. Second, it proposes new methods for calculating packet delay and energy consumption. The analytical model is validated through discrete-event based simulations. Numerical results demonstrate that the proposed analytical model and methods yield accurate results under realistic assumptions

research product

Subjective Logic-Based In-Network Data Processing for Trust Management in Collocated and Distributed Wireless Sensor Networks

While analyzing an explosive amount of data collected in today’s wireless sensor networks (WSNs), the redundant information in the sensed data needs to be handled. In-network data processing is a technique which can eliminate or reduce such redundancy, leading to minimized resource consumption. On the other hand, trust management techniques establish trust relationships among nodes and detect unreliable nodes. In this paper, we propose two novel in-network data processing schemes for trust management in static WSNs. The first scheme targets at networks, where sensor nodes are closely collocated to report the same event. Considering both spatial and temporal correlations, this scheme generat…

research product

Lightweight Relay Selection in Multi-Hop Wake-Up Radio Enabled IoT Networks

Wake-up Radios (WuRs) are becoming more popular in Internet of Things (IoT) networks owing to their overwhelming advantages such as low latency, high energy saving, and on-demand communication. In a multi-hop WuR-IoT network, route establishment between source and destination prior to actual data communications consumes a significant portion of energy. To reduce energy consumption and protocol overhead for route establishment, we propose a lightweight relay (LR) selection scheme, referred to as LR-WuR, where a lookup table and acknowledgment are used for next hop relay selection. We develop an analytical model to evaluate the performance of LR-WuR. Extensive simulations are performed to val…

research product

A distributed data storage and retrieval scheme in unattended WSNs using Homomorphic Encryption and secret sharing

Many data storage schemes have been proposed in the past for keeping dependable data storage, but they are not designed for Unattended Wireless Sensor Networks (UWSNs). When applying these schemes to UWSNs, most of them have limitations such as high storage requirement, transmission cost, and not resilient to a large number of node compromises. To address the problem of data storage, transmission cost, and resilience of node compromise in UWSNs, we propose a novel Homomorphic Encryption and Homomorphic Secret Sharing based scheme (HEHSS) to accomplish the goals of confidentiality, resilience to node compromises, reliability, and efficiency of storage and transmission. Our scheme exploits th…

research product

OLSR Mesh Networks for Broadband Access: Enhancements, Implementation and Deployment

In the context of an EU FP6 project, ADHOCSYS, we have developed a reliable and cost-effective solution for broadband Internet access in rural and mountainous areas. This solution is built based on multi-hop wireless mesh networking technologies and covers many aspects such as routing, reliability, QoS, security, self-configuration, self-healing, remote network monitoring, power management etc. In this paper, we present solely the routing aspect of the developed mesh network, focusing on new routing features that have been designed, implemented, and deployed in a real-life operational network. These new features are developed based on an extended version of the OLSR protocol. The test resul…

research product

A dynamic channel access strategy for underlay cognitive radio networks: Markov modelling and performance evaluation

Unlike in overlay cognitive radio networks, secondary users in underlay cognitive radio networks can access licensed spectrum even at the presence of a primary user, given that the interference caused by the secondary transmission is lower than a pre-specified threshold. Based on this underlay access principle, we propose in this paper a dynamic channel access strategy for multi-channel cognitive radio networks. Different from existing underlay access techniques, channel assembling, spectrum adaptation and restricted channel occupancy are also considered in the proposed strategy in order to achieve better performance in the secondary network. Accordingly, a partial channel occupancy mode, w…

research product

An efficient Chinese remainder theorem based node capture resilience scheme for Mobile WSNs

Node capture attack is a critical issue in Mobile WSNs where attacker-controlled replicas may act maliciously. In this paper, we present a novel Chinese remainder theorem based node capture resilience scheme that can be utilized to discover and revoke captured nodes. Moreover, our scheme can limit the ability of captured nodes to further compromise forward security, backward security, and launch collusion attacks. Detailed analysis shows that our scheme indeed achieves the expected design goals.

research product

A Single radio based channel datarate-aware parallel rendezvous MAC protocol for cognitive radio networks

Channel hopping based parallel rendezvous multichannel MAC protocols have several advantages since they do not need a control channel, require only one transceiver, and produce higher system capacity. However, channel hopping sequences in existing parallel rendezvous MAC protocols have been designed as irrelevant to channel datarates, leading to under-utilization of channel resources in multi-rate multi-channel networks. Considering that datarates among channels may be different, we propose a dynamic parallel rendezvous multichannel MAC protocol for synchronized cognitive radio networks in which the secondary users adjust their own distinct hopping sequences according to the datarates of th…

research product

Formal verification of a Cooperative Automatic Repeat reQuest MAC protocol

Author's version of an article published in the journal: Computer Standards & Interfaces. Also available from the publisher at: http://dx.doi.org/10.1016/j.csi.2011.12.001 Cooperative communications, in which a relay node helps the source node to deliver its packets to the destination node, are able to obtain significant benefits in terms of transmission reliability, coverage extension and energy efficiency. A Cooperative Automatic Repeat reQuest (C-ARQ) MAC protocol has been recently proposed to exploit cooperative diversity at the MAC layer. in this paper, we validate the integrity and the validity of the C-ARQ protocol using formal methods. The protocol logic is modeled in SDL and implem…

research product

Joint Optimization of Detection Threshold and Resource Allocation in Infrastructure-based Multi-band Cognitive Radio Networks

[EN] Consider an infrastructure-based multi-band cognitive radio network (CRN) where secondary users (SUs) opportunistically access a set of sub-carriers when sensed as idle. The carrier sensing threshold which affects the access opportunities of SUs is conventionally regarded as static and treated independently from the resource allocation in the model. In this article, we study jointly the optimization of detection threshold and resource allocation with the goal of maximizing the total downlink capacity of SUs in such CRNs. The optimization problem is formulated considering three sets of variables, i.e., detection threshold, sub-carrier assignment and power allocation, with constraints on…

research product

The heterogeneity of inter-domain Internet application flows: entropic analysis and flow graph modelling

The growing popularity of the Internet has triggered the proliferation of various applications, which possess diverse communication patterns and user behaviour. In this paper, the heterogeneous characteristics of Internet applications and traffic are investigated from a complex network and entropic perspective. On the basis of real-life flow data collected from a public network provided by an Internet service provider, flow graphs are constructed for five types of applications as follows: Web, P2P Download, P2P Stream, Video Stream and Instant Messaging. Three types of entropy measures are introduced to the flow graphs, and the heterogeneity of applications within a 24-h period is analysed …

research product

Achieving Ultra Energy-efficient and Collision-free Data Collection in Wake-up Radio Enabled mIoT

research product

A measurement-based study on the correlations of inter-domain Internet application flows

Internet traffic characterization has a profound impact on network engineering and traffic identification. Existing studies are often carried out on a per-flow basis, focusing on the properties of individual flows. In this paper, we study the interaction of Internet traffic flows and network features from a complex network perspective, focusing on six types of applications: P2P file sharing, P2P stream, HTTP, instant messaging, online games and abnormal traffic. With large-volume traffic flow records collected through proprietary line-speed hardware-based monitors, we construct flow graphs of these different application types. Based on the flow graphs, we calculate the correlation coefficie…

research product

System times and channel availability analyses in multi-channel cognitive radio networks

Channel accessibility by a secondary user (SU) in cognitive radio networks (CRNs) depends on the availability of the spectrum based on primary user and other SU activities. A new SU request may be blocked and an ongoing SU service may also be discarded if no sufficient spectrum is available. So far, little work has been done to analyze the reliability and availability aspects of CRNs from the perspective of the dependability theory. In this paper, we introduce the concept of availability for spectrum access in multi-channel CRNs, which is defined as the fraction of time that a CRN can allocate at least the minimum number of required channels for a new SU request. Through a proposed continuo…

research product

An adaptive cooperative MAC mechanism in multi-hop wireless networks

In this paper, we propose a novel adaptive cooperative MAC mechanism that is specifically designed for two-hop cooperative communications where source and destination cannot hear each other directly. The proposed scheme employs an efficient adaptive relay selection algorithm such that the number of relay nodes is optimized for each cooperative transmission to maximize cooperation benefits and effectively avoid potential collisions with other transmissions. In order to determine the optimal number of relays we apply a training sequence in Hello message exchange, which provides us with a channel status indicator combining both bit-level and flow-level information. Numerical results show that …

research product

Circuit-Elimination based Link-State Routing in Mobile Ad-hoc Networks

Circuit-elimination based connected dominating set formation is an efficient technique for reducing routing overhead in mobile ad hoc networks. In this paper, we propose a new message dissemination algorithm which utilizes such techniques to reduce the number of nodes that generate or forward link state advertisements in link state routing protocols. Simulation results with both static and dynamic network topologies demonstrate the potential of the proposed algorithm to reduce routing overhead, compared with a benchmark link state routing protocol, OLSR.

research product

System Times and Channel Availability for Secondary Transmissions in CRNs: A Dependability Theory based Analysis

[EN] Reliability is of fundamental importance for the performance of secondary networks in cognitive radio networks (CRNs). To date, most studies have focused on predicting reliability parameters based on prior statistics of traffic patterns from user behavior. In this paper, we define a few reliability metrics for channel access in multichannel CRNs that are analogous to the concepts of reliability and availability in classical dependability theory. Continuous-time Markov chains are employed to model channel available and unavailable time intervals based on channel occupancy status. The impact on user access opportunities based on channel availability is investigated by analyzing the stead…

research product

Collision Avoidance in Wake-Up Radio Enabled WSNs: Protocol and Performance Evaluation

In wake-up radio (WuR) enabled wireless sensor networks (WSNs), the envisaged application scenarios are primarily targeted at low traffic load conditions. When applying WuR to medium or heavy traffic load scenarios, however, collisions among wake-up calls (WuCs) may happen, resulting in a lower packet delivery ratio (PDR). In this paper, we propose a media access control protocol for WuR- enabled WSN that is capable of avoiding WuC collisions by activating a contention-based collision avoidance mechanism for WuC transmissions. The performance of the proposed protocol is evaluated by a Markov chain based mathematical model and is compared with a WuR protocol that performs only clear channel as…

research product

Optimal Service Placement with QoS Monitoring in NFV and Slicing Enabled 5G IoT Networks

Network function virtualization (NFV) and network slicing are two promising enabling technologies for 5G networks. Considering the volume of data traffic generated by Internet of things (IoT) applications and their service requirement diversity as well as that network resources are spread across different locations, it is imperative to find solutions for optimal service placement and resource allocation for quality of service (QoS) provisioning. In this paper, we address the challenges of optimal network service placement with active QoS monitoring in NFV and network slicing enabled 5G IoT networks and propose a network architecture with optimal computation and resource placement over core,…

research product

A cooperative lifetime extension MAC protocol in duty cycle enabled wireless sensor networks

To reduce energy consumption in wireless sensor networks, the concept of duty cycle is used in many MAC protocols. Although these protocols provide efficient energy-conservation solutions, they cannot resolve the energy hole problem in a multi-hop network, where a few nodes near the sink must relay the packets from the rest of the network, and consequently exhaust their batteries earlier. The previously proposed REACT forwarding protocol triggers the cooperation of several nodes to extend transmission range and hop over the highly burdened node, thereby allowing it to save its energy and extend the lifetime of the network. However, the previous work lacked a MAC protocol with a duty cycle. …

research product

A novel traffic splitting policy for performance improvement in wireless mesh networks

Wireless mesh networks are expected to play an important role in the next-generation wireless communication systems as it can provide wide coverage and scalable broadband Internet access services. However, as more traffic is injected into the network it may lead to throughput degradation, packet loss and longer transmission delay. In this paper, we argue that network performance can be improved by cross-layer design over multiple layers and load balancing based on service types. Correspondingly, a novel traffic splitting policy which can potentially utilize diverse paths for transmitting traffic flows of different service types from the same router has been proposed and investigated. Such a…

research product

Proportional and Preemption-Enabled Traffic Offloading for IP Flow Mobility: Algorithms and Performance Evaluation

IP Flow Mobility (IFOM) enables a user equipment to offload data traffic at the IP flow level. Although the procedure of IFOM-based flow offloading has been specified by 3GPP, how many IP flows should be offloaded and when offloading should be performed are not defined. Consequently, IP flows may be routed to a target access network which has a strong signal strength but with backhaul congestion or insufficient access capability. In this paper, we propose two algorithms, referred to as proportional offloading (PO), and proportional and preemption-enabled offloading (PPO), respectively, for IP flow offloading in hybrid cellular and wireless local area networks. The PO algorithm decides an op…

research product

On the Performance of Channel Assembling and Fragmentation in Cognitive Radio Networks

[EN] Flexible channel allocation may be applied to multi-channel cognitive radio networks (CRNs) through either channel assembling (CA) or channel fragmentation (CF). While CA allows one secondary user (SU) occupy multiple channels when primary users (PUs) are absent, CF provides finer granularity for channel occupancy by allocating a portion of one channel to an SU flow. In this paper, we investigate the impact of CF together with CA for SU flows by proposing a channel access strategy which activates both CF and CA and correspondingly evaluating its performance. In addition, we also consider a novel scenario where CA is enabled for PU flows. The performance evaluation is conducted based on…

research product

Combining Auto-Encoder with LSTM for WiFi-Based Fingerprint Positioning

Although indoor positioning has long been investigated by various means, its accuracy remains concern. Several recent studies have applied machine learning algorithms to explore wireless fidelity (WiFi)-based positioning. In this paper, we propose a novel deep learning model which concatenates an auto-encoder with a long short term memory (LSTM) network for the purpose of WiFi fingerprint positioning. We first employ an auto-encoder to extract representative latent codes of fingerprints. Such an extraction is proven to be more reliable than simply using a deep neural network to extract representative features since a latent code can be reverted back to its original input. Then, a sequence o…

research product

An optimized path-selection using airtime metric in OLSR networks: Implementation and testing

Wireless mesh networks used for broadband access may be equipped with multiple Internet gateways. Using airtime metric as the main criterion for path selection is an effective method for achieving load-balancing in such a multi-homed mesh network. In this paper, we describe how the radio-aware path selection using airtime as a metric can be implemented in order to achieve this functionality, based on a modified version of an open source OLSR implementation. The paper presents both the principle of this method, its implementation and the empirical results which focus on testing the airtime metric functionality based on a deployed small-scale test network.

research product

A spatial role-based authorization framework for sensor network-assisted indoor WLANs

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/WIRELESSVITAE.2009.5172549 In this paper, we propose a spatial role-based authorization framework which specifies authorization based on both role and location constrains in a wireless local area network with assistance from a sensor network. The framework performs a location-restricted verificati…

research product

Performance comparison of residual related algorithms for ToA positioning in wireless terrestrial and sensor networks

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE." Article also available from publisher: http://dx.doi.org/10.1109/WIRELESSVITAE.2009.5172462 Time of Arrival (ToA) is a popular technique for terrestrial positioning. This paper presents a comparison of ToA based residual related positioning algorithms in wireless terrestrial and sensor networks in both long range outdoor and short range indoor environments. Us…

research product

Enabling Backoff for SCM Wake-Up Radio: Protocol and Modeling

In sub-carrier modulation (SCM) wake-up radio (WuR) enabled wireless sensor networks, a node can initiate data transmission at any instant of time. In this letter, we propose to activate a backoff procedure before sending wake-up calls (WuCs) in order to avoid potential collisions among WuCs. Consequently, no backoff is needed for the main radio after a WuC is received. A discrete-time Markov chain model is developed to evaluate the performance. Numerical results on network throughput, energy efficiency, average delay, and collision probability reveal the benefits of enabling backoff for SCM-WuRs, especially under heavy traffic loads or saturated traffic conditions.

research product

A Joint Time-Space Domain Analysis for Ultra-Reliable Communication in 5G Networks

Reliable communication is a fundamental service level agreement criterion in wireless networks. Moreover, it is a performance indicator for ultra- reliable communication (URC) in emerging 5G networks. In URC, the quality of the delivered services to end-users ultimately depends on the availability of network resources as well as the quality of the received signal. Therefore, in order to analyze URC in cellular networks, both time- dependent spectrum availability and space-dependent service quality need to be considered. In this paper, we present a combined time and space domain analysis on network reliability based on a continuous time Markov chain model. To this end, we introduce a new rel…

research product

Greedy versus Dynamic Channel Aggregation Strategy in CRNs: Markov Models and Performance Evaluation

Part 1: - PE-CRN 2011 Workshop; International audience; In cognitive radio networks, channel aggregation techniques which aggregate several channels together as one channel have been proposed in many MAC protocols. In this paper, we consider elastic data traffic and spectrum adaptation for channel aggregation, and propose two new strategies named as Greedy and Dynamic respectively. The performance of channel aggregation represented by these strategies is evaluated using continuous time Markov chain models. Moreover, simulation results based on various traffic distributions are utilized in order to evaluate the validity and preciseness of the mathematical models.

research product

Analysis on channel bonding/aggregation for multi-channel cognitive radio networks

Channel bonding/aggregation techniques, which assemble several channels together as one channel, could be used in cognitive radio networks for the purpose of achieving better bandwidth utilization. In existing work on this topic, channel bonding/aggregation is focused on the cases when primary channels are time slotted or stationary as compared with secondary users' activities. In this paper, we analyze the performance of channel bonding/aggregation strategies when primary channels are not time slotted and the time scale of primary activities is at the same level as the secondary users', given that spectrum handover is not allowed. Continuous time Markov chain models are built in order to a…

research product

SCARKER: A sensor capture resistance and key refreshing scheme for mobile WSNs

How to discover a captured node and to resist node capture attack is a challenging task in Wireless Sensor Networks (WSNs). In this paper, we propose a node capture resistance and key refreshing scheme for mobile WSNs which is based on the Chinese remainder theorem. The scheme is able of providing forward secrecy, backward secrecy and collusion resistance for diminishing the effects of capture attacks. By implementing our scheme on a Sun SPOT based sensor network testbed, we demonstrate that the time for updating a new group key varies from 56 ms to 546 ms and the energy consumption is limited to 16.5–225 mJ, depending on the length of secret keys and the number of sensors in a group.

research product

FoSBaS: A bi-directional secrecy and collusion resilience key management scheme for BANs

Body Area Network (BAN) consists of various types of small physiological sensors, transmission modules and low computational components and can thus form an E-health solution for continuous all-day and any-place health monitoring. To protect confidentiality of collected data, a shared group key is usually deployed in a BAN, and consequently a secure communication group is generated. In this paper, we propose a bi-directional security and collusion resilience key management scheme for BAN, referred to as FoSBaS. Detailed analysis shows that the scheme can provide both forward security and backward security and resist against collusion attacks. Furthermore, the FoSBaS is implemented on a Sun …

research product

Dependability-Based Reliability Analysis in URC Networks: Availability in the Space Domain

Ultra-reliable low latency communication (URLLC), which refers to achieving almost 100% reliability at a certain (satisfactory) level of services and stringent latency, is one of the key requirements for 5G networks. However, most prior studies on reliable communication did not address space domain analysis. Neither were they pursued from a dependability perspective. This paper addresses the ultra-reliable communication (URC) aspect of URLLC and aims at advocating the concept of URC from a dependability perspective in the space domain. We perform in-depth analysis on URC considering both the spatial characteristics of cell deployment and user distributions, as well as service requirements. …

research product

Analysis of mobile-oriented energy consumption for heterogeneous connections in hybrid wireless networks

While more and more mobile devices are equipped with both cellular and WLAN interfaces for internet access, the energy consumption aspect of these connections has not been studied in depth in the literature. In this paper, a hybrid network with three alternative wireless connections, namely, a cellular component, a combined component with a mixed ad hoc and cellular link, or an infrastructure-based WLAN component, is investigated. A distance-based analysis on the energy consumption of a mobile station has been performed for each alternative wireless connection, and corresponding numerical results have been obtained. The results suggest that, to increase link throughput while maintaining min…

research product

Channel Assembling with Priority-Based Queues in Cognitive Radio Networks: Strategies and Performance Evaluation

[EN] With the implementation of channel assembling (CA) techniques, higher data rate can be achieved for secondary users in multi-channel cognitive radio networks. Recent studies which are based on loss systems show that maximal capacity can be achieved using dynamic CA strategies. However the channel allocation schemes suffer from high blocking and forced termination when primary users become active. In this paper, we propose to introduce queues for secondary users so that those flows that would otherwise be blocked or forcibly terminated could be buffered and possibly served later. More specifically, in a multi-channel network with heterogeneous traffic, two queues are separately allocate…

research product

Capacity Upper Bound of Channel Assembling in Cognitive Radio Networks with Quasistationary Primary User Activities

In cognitive radio networks (CRNs) with multiple channels, various channel-assembling (ChA) strategies may be applied to secondary users (SUs), resulting in different achieved capacity. However, there is no previous work on determining the capacity upper bound (UB) of ChA for SUs under given system configurations. In this paper, we derive the maximum capacity for CRNs with ChA through Markov chain modeling, considering that primary user (PU) activities are relatively static, compared with SU services. We first deduce a closed-form expression for the maximum capacity in a dynamic ChA strategy and then demonstrate that no other ChA strategy can provide higher capacity than that achieved by th…

research product

Power consumption analysis for mobile stations in hybrid relay-assisted wireless networks

While Internet access using mobile or wireless technologies has become ubiquitous these days, the energy consumption aspect of such connections has not been studied in-depth yet. In this paper, a hybrid wireless network, which consists of a cellular component and a relay-assisted ad hoc component, is studied focusing on energy consumption by mobile stations with respect to the amount of data communicated and achieved battery lifetime. Four alternative paths are considered, including both pure cellular and hybrid ad hoc/cellular links for uplink and downlink traffic. The effects of each alternative connection on energy consumption of the involved mobile stations are analyzed in terms of the …

research product

An enhanced TCP congestion avoidance scheme and its performance evaluation in high speed satellite networks

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE." Article also available from publisher: http://dx.doi.org/10.1109/ICICS.2009.5397691 High speed satellite communication networks are emerging as part of the future global wireless communication systems. However, existing transmission control protocols for satellite networks do not provide satisfactory performance over high speed satellite links due to their ine…

research product

Cooperative RTS/CTS MAC with relay selection in distributed wireless networks

This paper proposes a cooperative multiple access protocol based on the Distributed Coordination Function (DCF) Request-To-Send/Clear-To-Send (RTS/CTS) scheme for distributed wireless networks. It answers three key questions concerning cooperation from the network perspective, namely when to cooperate, whom to cooperate with and how to protect cooperative transmissions. According to our protocol, the cooperation is initiated only if the direct transmission fails. An optimal relay node is selected in a distributed manner according to instantaneous relay channel conditions without prior information or extra signaling among relay candidates in the network. An additional three-way handshake is …

research product

An automatic cooperative retransmission MAC protocol in Wireless Local Area Networks

Existing solutions for cooperation in wireless networks either require simultaneous transmission of source and relay nodes or impose major modifications to original MAC protocols. In this paper, a new efficient retransmission MAC protocol is proposed for IEEE 802.11 based cooperation communications, with minimum modifications to the DCF scheme. Throughput and access delay performance of the proposed protocols is analyzed in error-prone and highly temporally correlated channels. Numerical results show that significant benefits can be achieved with our cooperative protocol, compared with the legacy schemes.

research product

Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs

Unattended Wireless Sensor Networks (UWSNs), characterized by the absence of real-time communication between sensors and sinks, impose sensors to retain data till the next visit of a mobile sink to off-load their data. In such networks, if a sensor is compromised, data accumulated in the sensor are exposed to attackers. In addition, by holding the secret key of the compromised sensor, attackers can also learn post-compromise data accumulated by the sensor. Furthermore, once sensors stop working due to, for instance, node crash or battery depletion, all the accumulated data will be lost. In this paper, we propose a secure and reliable data distribution scheme that addresses these challenges.…

research product