0000000000082668

AUTHOR

Frank Y. Li

showing 124 related works from this author

Energy Harvesting-Aware Backoff Algorithms for Distributed Device-to-Device Communication

2016

Due to limited energy capacity in mobile devices, energy harvesting is regarded as a promising technology for lifetime extension in device-to-device (D2D) communication. However, medium access control (MAC) protocols designed for D2D communication intrinsically do not consider the existence of harvested energy. In this paper we study four backoff (BO) algorithms, among which one algorithm is proposed to enhance the BO selection based on energy harvesting rate and residual energy of devices. Simulations are performed in order to assess how the proposed algorithm can extend the lifetime of a D2D communication network as well as to provide fair channel access opportunities among devices.

Engineeringbusiness.industryDevice to device05 social sciences050801 communication & media studies020206 networking & telecommunicationsAccess control02 engineering and technologyTelecommunications networkLifetime extension0508 media and communications0202 electrical engineering electronic engineering information engineeringbusinessAlgorithmMobile deviceEnergy harvestingEnergy (signal processing)Computer networkCommunication channel2016 IEEE 83rd Vehicular Technology Conference (VTC Spring)
researchProduct

MAC strategies for single rendezvous multi-hop cognitive radio networks

2009

This paper presents two MAC strategies for multi-hop cognitive radio networks in single radio multi-channel cases. Both strategies use one of the idle multiple channels for communication among secondary users, and the network will leave the current channel and jump to another channel as a group if any primary user appears. The first strategy is based on a pre-defined pattern that will always tune to the next available channel when primary user emerges. The second one is based on the concept of connected dominating set in which a backbone is formed in the network in order to keep the continuity of the communication. The strategies are evaluated in both homogeneous and heterogeneous channels …

Routing protocolCognitive radiobusiness.industryComputer scienceDistributed computingRendezvousThroughputbusinessConnected dominating setComputer Science::Information TheoryComputer networkHop (networking)Communication channel2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications
researchProduct

Two Teletraffic-based Schemes for Energy Saving in Cellular Networks with Micro-cells

2012

Published version of an article in the journal: Journal of Communications. Also available from the publisher at: http://dx.doi.org/10.4304/jcm.7.10.726-739 Open access The energy consumption of Base Stations (BSs) is known to constitute a major part of the power consumption in a cellular network. In this paper, we propose a novel approach which may switch a BS off under light traffic conditions in order to conserve the power consumption of such networks. More specifically, when the traffic load in the middle cell of a network with three micro-cells is sufficiently low, the corresponding BS can be switched off and its users will be covered by increasing the transmission power of one sector a…

Micro cellteletrafficMarkov chainComputer sciencebusiness.industryMarkov chainPower savingmicro-cellpower savingFMDPVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Cellular networkElectrical and Electronic EngineeringbusinessTelecommunicationsoptimizationEnergy (signal processing)energyBSComputer networkJournal of Communications
researchProduct

A contention-based multiple access protocol in cooperative wireless networks

2010

Cooperative communication has emerged as a promising technique to enhance system performance in wireless networks. This paper proposes a contention-based cooperative multiple medium access control protocol by means of multiple retransmissions of the same packet from different relay nodes. The proposed scheme exploits cooperative communication capability not only from time diversity derived from multiple temporal transmissions but also spatial diversity derived from distributed multiple relays. A Markov chain is introduced to analyze the throughput performance of the proposed cooperative scheme. The performance evaluation of the protocol is validated and compared with non-cooperative ARQ pro…

Computer scienceWireless networkbusiness.industryNetwork packetDistributed computingAutomatic repeat requestComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSThroughputAntenna diversityTime diversitylaw.inventionCooperative diversityRelaylawComputer Science::Networking and Internet ArchitectureChannel access methodbusinessComputer Science::Information TheoryCommunication channelComputer networkProceedings of the 6th International Wireless Communications and Mobile Computing Conference
researchProduct

Does higher datarate perform better in IEEE 802.11-based multihop ad hoc networks?

2007

Due to the nature that high datarate leads to shorter transmission range, the performance enhancement by high datarate 802.11 WLANs may be degraded when applying high datarate to an 802.11 based multihop ad hoc network. In this paper, we evaluate, through extensive simulations, the performance of multihop ad hoc networks at multiple transmission datarates, in terms of the number of hops between source and destination, throughput, end-to-end delay and packet loss. The study is conducted based on both stationary chain topology and mesh topologies with or without node mobility. From numerical results on network performance based on chain topology, we conclude that there is almost no benefit by…

Computer Networks and Communicationsbusiness.industryComputer scienceWireless ad hoc networkNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMesh networkingThroughputNetwork topologyIEEE 802.11Packet lossNetwork performancebusinessInformation SystemsComputer networkJournal of Communications and Networks
researchProduct

Achieving Ultra Reliable Communication in 5G Networks: A Dependability Perspective Availability Analysis in the Space Domain

2017

As part of the 5G communication paradigm, ultra reliable communication (URC) is envisaged as an important technology pillar for providing anywhere and anytime services to end users. While most existing studies on reliable communication do not investigate this problem from a dependability theory perspective, those dependability-based studies tend to define reliability merely in the time domain. In this letter, we advocate extending the concept of URC from the dependability perspective also in the space domain . We initiate definitions on cell availability and system availability. The availability and the probability of providing a guaranteed level of availability in a network are analyzed bo…

Reliability theorybusiness.industryComputer scienceDistributed computingReliability (computer networking)05 social sciences050801 communication & media studies020206 networking & telecommunications02 engineering and technologyNetwork topologyComputer Science ApplicationsDomain (software engineering)0508 media and communicationsSoftware deploymentModeling and Simulation0202 electrical engineering electronic engineering information engineeringCellular networkDependabilityElectrical and Electronic EngineeringbusinessHeterogeneous networkComputer networkIEEE Communications Letters
researchProduct

ACT-MAC: An asynchronous cooperative transmission MAC protocol for WSNs

2014

Duty cycling (DC) has been proven to be an efficient mechanism to reduce energy consumption in wireless sensor networks (WSNs). On the other hand, cooperative transmission (CT) enables longer range transmission to hop over an energy-hole node, resulting in more balanced energy consumption among nodes. In the literature, there exist few CT MAC protocols for DC operated WSNs and these protocols rely on fixed cycle length. In this paper, we propose a novel variable cycle length protocol, namely asynchronous cooperative transmission medium access control (ACT-MAC), which contains both features of reducing the unnecessary idle listening by DC and mitigating the energy-hole by making use of CT. T…

Computer sciencebusiness.industryAsynchronous communicationComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputer Science::Networking and Internet ArchitectureAccess controlEnergy consumptionbusinessWireless sensor networkEfficient energy useHop (networking)Computer network2014 IEEE International Conference on Communications Workshops (ICC)
researchProduct

Low-Power Wide-Area Networks for Sustainable IoT

2019

Low-power wide-area (LPWA) networks are attracting extensive attention because of their abilities to offer low-cost and massive connectivity to Internet of Things (IoT) devices distributed over wide geographical areas. This article provides a brief overview on the existing LPWA technologies and useful insights to aid the large-scale deployment of LPWA networks. Particularly, we first review the currently competing candidates of LPWA networks, such as narrowband IoT (NB-IoT) and long range (LoRa), in terms of technical fundamentals and large-scale deployment potential. Then we present two implementation examples on LPWA networks. By analyzing the field-test results, we identify several chall…

FOS: Computer and information sciencesComputer scienceComputer Science - Information Theory0805 Distributed Computing02 engineering and technologylaw.inventionComputer Science - Networking and Internet ArchitectureBluetoothGSMlaw1005 Communications Technologies0202 electrical engineering electronic engineering information engineeringBandwidth (computing)Resource managementElectrical and Electronic EngineeringNetworking and Internet Architecture (cs.NI)business.industryInformation Theory (cs.IT)020206 networking & telecommunicationsComputer Science ApplicationsPower (physics)0906 Electrical and Electronic EngineeringWide areaSoftware deploymentNetworking & TelecommunicationsTelecommunicationsbusinessInternet of Things
researchProduct

Enabling Backoff and Eliminating Redundant Idle Period for Medium Access in LTE-U

2017

To address the burgeoning demand for mobile data, 3GPP is actively studying the capability of operating LTE in the unlicensed band, referred to as LTE-U. One of the main challenges of this approach is to maintain better coexistence between WiFi and LTE-U devices. To enable the coexistence, the listen before talk (LBT) principle has been adopted for LTE-U medium access with two flavors of mechanisms, i.e., load based equipment (LBE) and frame based equipment (FBE) access. In this paper, we consider the FBE mechanism and enhance its performance by introducing a backoff procedure for LTE devices. We investigate the original FBE mechanism defined by 3GPP and the enhanced FBE (E- FBE) mechanism fr…

Transmission delaybusiness.industryComputer scienceMobile broadbandComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS05 social sciences050801 communication & media studiesIdle0508 media and communicationsTransmission (telecommunications)0502 economics and businessListen before talk050211 marketingbusinessComputer network2017 IEEE 86th Vehicular Technology Conference (VTC-Fall)
researchProduct

Enabling Soft Frequency Reuse and Stienen's Cell Partition in Two-Tier Heterogeneous Networks: Cell Deployment and Coverage Analysis

2021

Heterogeneous cellular networks (HetNets) are one of the key enabling technologies for fifth generation (5 G) networks. In HetNets, the use of small base stations (SBSs) inside the coverage area of a macro base station (MBS) offers higher throughput and improved coverage. However, such multi-tier base station deployment introduces new challenges, e.g., (i) All users experience significant inter-cell interference (ICI) due to frequency reuse, (ii) SBS associated users experience severe MBS-interference due to higher MBS transmit power, and (iii) MBS coverage edge users receive lower signal-to-interference ratio (SIR) due to longer distances. To address the aforementioned challenges, this wor…

Computer Networks and CommunicationsComputer sciencebusiness.industryAerospace Engineering020302 automobile design & engineeringThroughput02 engineering and technologyTransmitter power outputFrequency reuseBase station0203 mechanical engineeringSoftware deploymentAutomotive EngineeringTelecommunications linkCellular networkNetwork performanceEnhanced Data Rates for GSM EvolutionElectrical and Electronic EngineeringbusinessHeterogeneous networkComputer networkIEEE Transactions on Vehicular Technology
researchProduct

A novel teletraffic-based power saving scheme for cellular networks with microcells

2011

As the number of network components increases to meet the explosion of mobile devices, power conservation has become an important strategy for network operators. In this paper, we propose a novel teletraffic-based approach to save power consumption of a three-cell microcellular network. When the traffic load in the middle cell is lower than certain threshold, the cell can be switched-off and its users will be covered by increasing the transmission power of one sector antenna in each of the two neighboring cells. Numerical results demonstrate that at a moderate cost of increased antenna transmission power of the two sectors, significant amount of network power can be saved for the whole netw…

Transmission (telecommunications)business.industryComputer scienceCellular networkSector antennaMobile telephonyAntenna (radio)businessTeletraffic engineeringComputer networkPower (physics)2011 IEEE 36th Conference on Local Computer Networks
researchProduct

Significance of channel failures on network performance in CRNs with reserved spectrum

2016

It is well understood that in wireless networks, channel failures, which are typically caused by equipment or power failures as well as intrinsic features in radio transmissions, such as fading and shadowing, can easily result in network performance degradation. Therefore, fast recovery from channel failures is an important measure that should be incorporated with those networks. Consequently, in a cognitive radio network (CRN), channel failures can cause significant performance degradation in both primary and secondary networks. Instead, retainability, i.e., the capability of providing continuous connection for users must be guaranteed even if a significant network element is disrupted. In…

Wireless networkbusiness.industryComputer scienceQuality of service020302 automobile design & engineering020206 networking & telecommunications02 engineering and technologyCognitive networkCognitive radioNetwork element0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringNetwork performanceFadingRadio resource managementbusinessComputer networkCommunication channel2016 IEEE International Conference on Communications (ICC)
researchProduct

A TDMA-Based MAC Protocol Supporting Cooperative Communications in Wireless Mesh Networks

2011

This paper proposes a TDMA-based medium access control protocol which enables cooperative communications in multi-hop wireless mesh networks. According to the proposed scheme, each router at the two-hop neighbourhood of each other is allocated to a specific time slot for accommodating either direct or cooperative transmissions in a coordinated manner, controlled by mini-slots which are part of the time slot. Benefiting from the elaborate mini-slot design, channel resources are fairly and efficiently allocated to each router so that no handshake is needed prior to each packet transmission. By providing access priority to cooperative transmission through an optimal relay which is determined b…

RouterHandshakeWireless mesh networkComputer Networks and Communicationsbusiness.industryComputer scienceNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTime division multiple accessAccess controlData_CODINGANDINFORMATIONTHEORYlaw.inventionHardware and ArchitectureRelaylawbusinessRelay channelComputer networkInternational journal of Computer Networks & Communications
researchProduct

Optimization of the Relay Selection Scheme in Cooperative Retransmission Networks

2011

Cooperative MAC protocol design has attracted much attention recently thanks to the development of relaying techniques. In single-relay C-ARQ, the relay selection scheme cannot work efficiently in a dense network, due to high collision probability among different contending relays. In this paper, the throughput performance impairment from the collision is analysed in a typical network scenario. Thereby, we propose an optimized relay selection scheme aiming at maximizing system throughput by reducing collision probability. The throughput performance enhancement by the proposed optimal relay selection scheme is verified by simulations.

business.industryComputer scienceAutomatic repeat requestRetransmissionComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSThroughputData_CODINGANDINFORMATIONTHEORYlaw.inventionRelaylawComputer Science::Networking and Internet ArchitectureFadingbusinessThroughput (business)Selection (genetic algorithm)Relay channelComputer Science::Information TheoryComputer network2011 IEEE 73rd Vehicular Technology Conference (VTC Spring)
researchProduct

A Multi-Phase Decode-and-Forward Transmission Protocol in Cognitive Relay Networks: Outage Analysis and Relay Power Allocation

2015

Consider an underlay cognitive relay network with multiple source and destination pairs and that a decode-and-forward scheme is adopted at the relay. We propose a multi-phase transmission protocol in this paper which involves cooperation among source, relay and destination nodes. Given perfect interference elimination before decoding at the destination nodes, we derive closed-form expressions for outage probability calculation over Rayleigh fading channels. Furthermore, the optimal relay power allocation factor which leads to minimal outage probability is determined. Numerical results reveal the conditions under which satisfactory performance can be achieved based on the proposed scheme.

Link Access Procedure for Frame Relaybusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSData_CODINGANDINFORMATIONTHEORYlaw.inventionPower (physics)RelaylawComputer Science::Networking and Internet ArchitectureUnderlayTransmission protocolbusinessDecoding methodsRelay channelComputer Science::Information TheoryCommunication channelRayleigh fadingComputer network2015 IEEE 81st Vehicular Technology Conference (VTC Spring)
researchProduct

Channel Occupancy-Based Dynamic Spectrum Leasing in Multichannel CRNs: Strategies and Performance Evaluation

2016

Spectrum leasing has been proposed as an effective approach for enabling more flexible spectrum utilization in CRNs. In CRNs, a primary network (PN) which consists of multiple primary users (PUs) can lease part of the licensed spectrum to secondary users (SUs) in exchange for operational benefits. The focus of this study is to investigate how and to what extent the PN allows spectrum leasing in CRNs, considering the QoS requirements of the PN and the secondary network (SN). Correspondingly, we propose two dynamic spectrum leasing strategies, which can improve the QoS performance of SUs while ensuring sufficient remuneration for PUs. In order to dynamically adjust the portion of leased bandw…

business.industryComputer scienceQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputerApplications_COMPUTERSINOTHERSYSTEMS020206 networking & telecommunications020302 automobile design & engineering02 engineering and technologyBlocking (statistics)Cognitive radioDigital subscriber line0203 mechanical engineeringDynamic pricing0202 electrical engineering electronic engineering information engineeringResource allocationNetwork performanceElectrical and Electronic EngineeringbusinessSimulationComputer networkIEEE Transactions on Communications
researchProduct

Receiver-Initiated Data Collection in Wake-Up Radio Enabled mIoT Networks: Achieving Collision-Free Transmissions by Hashing and Partitioning

2021

To achieve ultra-low energy consumption and decade-long battery lifetime for Internet of Things (IoT) networks, wake-up radio (WuR) appears as an eminent solution. While keeping devices in deep sleep for most of the time, a WuR enabled IoT device can be woken up for data transmission at any time by a wake-up call (WuC). However, collisions happen among WuCs for transmitter-initiated data reporting and among data packets for receiver-initiated data collection . In this article, we propose three novel hashing-based schemes in order to achieve collision-free data transmissions for receiver-initiated data collection. We consider first a simple scenario where all devices in a region of interest …

Scheme (programming language)Data collectionSIMPLE (military communications protocol)Computer Networks and CommunicationsRenewable Energy Sustainability and the Environmentbusiness.industryNetwork packetComputer scienceHash functionVDP::Technology: 500Energy consumptionUploadbusinesscomputercomputer.programming_languageComputer networkData transmission
researchProduct

Preamble Reservation Based Access for Grouped mMTC Devices with URLLC Requirements

2019

Author's accepted manuscript (postprint). © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Available from 16/07/2021. Ultra-reliable low latency communication (URLLC) and massive machine type communications (mMTC) are two of the three major technological pillars in 5G. For medium access in mMTC scenarios, e.g., smart cities, a major bottleneck for achieving reli…

Access networkbusiness.industryComputer science05 social sciencesReservation050801 communication & media studiesPreamble0508 media and communications0502 economics and business050211 marketingLatency (engineering)businessVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 5505GRandom accessComputer networkCommunication channel
researchProduct

MDP-based Resource Allocation for Uplink Grant-free Transmissions in 5G New Radio

2020

The diversity of application scenarios in 5G mobile communication networks calls for innovative initial access schemes beyond traditional grant-based approaches. As a novel concept for facilitating small packet transmission and achieving ultra-low latency, grant-free communication is attracting lots of interests in the research community and standardization bodies. However, when a network consists of both grant based and grant-free based end devices, how to allocate slot resources properly between these two categories of devices remains as an unanswered question. In this paper, we propose a Markov decision process based scheme which dynamically allocates grant-free resources based on a spec…

Computer sciencebusiness.industry05 social sciences050801 communication & media studies0508 media and communications0502 economics and businessTelecommunications linkResource allocation050211 marketingMobile telephonyMarkov decision processbusiness5GComputer network2020 IEEE Wireless Communications and Networking Conference (WCNC)
researchProduct

Outage Probability Analysis of User-Centric SBS-Based HCNets Under Hybrid Rician/Rayleigh Fading

2020

To model dense user equipment (UE) distribution in heterogeneous cellular networks (HCNets), the Poisson cluster process (PCP) has emerged as a promising tool. In user-centric HCNets where UEs are distributed according to a PCP around a small base station (SBS), the network performance has been commonly studied in literature under a Rayleigh fading environment assumption. However, such an assumption may not hold in user-centric HCNets given the possible existence of a strong line-of-sight (LOS) link between UEs and BSs due to a relatively short transmission distance. This letter analyzes the performance of user-centric SBS based HCNets by considering that the desired LOS link experiences Ri…

Computer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsData_CODINGANDINFORMATIONTHEORY02 engineering and technologyComputer Science ApplicationsBase stationTransmission (telecommunications)Modeling and SimulationRician fadingComputer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringCellular networkNetwork performanceElectrical and Electronic EngineeringAlgorithmComputer Science::Information TheoryRayleigh fadingIEEE Communications Letters
researchProduct

Preamble Transmission Prediction for mMTC Bursty Traffic : A Machine Learning based Approach

2020

The evolution of Internet of things (IoT) towards massive IoT in recent years has stimulated a surge of traffic volume among which a huge amount of traffic is generated in the form of massive machine type communications. Consequently, existing network infrastructure is facing challenges when handling rapidly growing traffic load, especially under bursty traffic conditions which may more often lead to congestion. By proactively predicting the occurrence of congestion, we can implement necessary means and conceivably avoid congestion. In this paper, we propose a machine learning (ML) based model for predicting successful preamble transmissions at a base station and subsequently forecasting th…

Artificial neural networkComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS05 social sciences050801 communication & media studies020206 networking & telecommunicationsComputingMilieux_LEGALASPECTSOFCOMPUTING02 engineering and technologyMachine learningcomputer.software_genrePreambleBase station0508 media and communicationsRecurrent neural networkTransmission (telecommunications)Traffic volume0202 electrical engineering electronic engineering information engineeringArtificial intelligencebusinesscomputerVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550
researchProduct

Performance of frame transmissions and event-triggered sleeping in duty-cycled WSNs with error-prone wireless links

2018

Abstract Two types of packet transmission schemes are prevalent in duty-cycled wireless sensor networks, i.e., single packet transmission and aggregated packet transmission which integrates multiple packets in one frame. While most existing models are developed based on an error-free channel assumption, this paper evaluates the performance of both transmission schemes under error-prone channel conditions. We develop a four-dimensional discrete-time Markov chain model to investigate the impact of channel impairments on the performance of frame transmissions. Together with tracking the number of packets in the queue, number of retransmissions and number of active nodes, the fourth dimension o…

Computer Networks and Communicationsbusiness.industryNetwork packetComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS010401 analytical chemistryFrame (networking)020206 networking & telecommunicationsThroughput02 engineering and technologyEnergy consumption01 natural sciences0104 chemical sciencesTransmission (telecommunications)Packet lossComputer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringWirelessNetwork performancebusinessQueueWireless sensor networkComputer networkEfficient energy useCommunication channelComputer Networks
researchProduct

Energy Efficiency Evaluation of Cellular Networks Based on Spatial Distributions of Traffic Load and Power Consumption

2013

Energy efficiency has gained its significance when service providers' operational costs burden with the rapidly growing data traffic demand in cellular networks. In this paper, we propose an energy efficiency model for Poisson-Voronoi tessellation (PVT) cellular networks considering spatial distributions of traffic load and power consumption. The spatial distributions of traffic load and power consumption are derived for a typical PVT cell, and can be directly extended to the whole PVT cellular network based on the Palm theory. Furthermore, the energy efficiency of PVT cellular networks is evaluated by taking into account traffic load characteristics, wireless channel effects and interferen…

Networking and Internet Architecture (cs.NI)FOS: Computer and information sciencesbusiness.industryComputer scienceApplied MathematicsMonte Carlo method020206 networking & telecommunications020302 automobile design & engineering02 engineering and technologyService providerInterference (wave propagation)7. Clean energyComputer Science ApplicationsComputer Science - Networking and Internet Architecture0203 mechanical engineeringPower consumption0202 electrical engineering electronic engineering information engineeringElectronic engineeringCellular networkWirelessElectrical and Electronic EngineeringbusinessCommunication channelEfficient energy use
researchProduct

Cooperative communication design with distributed code allocation in a clustered network

2011

A major challenge for cooperative communication in distributed networks is to coordinate relay transmissions without introducing too much overhead. Targeting a clustered network, we propose a novel cooperative communication scheme including channel quality based relay selection and distributed space-time code allocation in this paper. Both analysis and simulations are carried out to investigate the performance of the proposed cooperative scheme, in terms of packet delivery rate, throughput and energy efficiency, under different channel conditions and network density.

Network packetComputer sciencebusiness.industryThroughputEnergy consumptionlaw.inventionCooperative diversityRelaylawComputer Science::Networking and Internet ArchitectureOverhead (computing)FadingbusinessWireless sensor networkRelay channelComputer Science::Information TheoryEfficient energy useCommunication channelComputer network2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications
researchProduct

Cellular Networks: An Evolution from 1G to 4G

2020

Computer scienceCellular networkNeuroscience
researchProduct

Dynamic Channel Aggregation Strategies in Cognitive Radio Networks with Spectrum Adaptation

2011

In cognitive radio networks, channel aggregation techniques which combine several channels together as one channel have been proposed in many MAC protocols. In this paper, spectrum adaptation is proposed in channel aggregation and two strategies which dynamically adjust channel occupancy of ongoing traffic flows are further developed. The performance of these strategies is evaluated using continuous time Markov chain models. Moreover, models in the quasi-stationary regime are analyzed and the closed-form capacity expression is derived in this regime. Numerical results demonstrate that the capacity of the secondary network can be improved by using channel aggregation with spectrum adaptation.

Computer sciencebusiness.industrySpectrum (functional analysis)Markov processUpper and lower boundsExpression (mathematics)symbols.namesakeCognitive radiosymbolsAdaptation (computer science)businessComputer Science::Information TheoryCommunication channelComputer network2011 IEEE Global Telecommunications Conference - GLOBECOM 2011
researchProduct

Cell Association With Load Balancing in Nonuniform Heterogeneous Cellular Networks: Coverage Probability and Rate Analysis

2017

To meet the ever-growing traffic demand and address the cell capacity shortage problem, associating end users to various tiers of cells in a multitier cellular network appears to be a promising approach. In this paper, we consider a nonuniform heterogeneous cellular network (NuHCN) and propose a cell association scheme that selectively mutes certain small-cell base stations (BSs) and covers end users by cell range extension (via cell biasing) for achieving load balancing. The envisaged NuHCN is comprised of two tiers of BSs, i.e., macro- and small-cell BSs, deployed according to three independent homogeneous Poisson point processes for BSs and end users, respectively. Accordingly, the avail…

Computer Networks and Communicationsbusiness.industryComputer scienceCoverage probabilityAerospace Engineering020206 networking & telecommunications020302 automobile design & engineering02 engineering and technologyLoad balancing (computing)Load managementBase station0203 mechanical engineeringAutomotive Engineering0202 electrical engineering electronic engineering information engineeringCellular networkMicrocellMacrocellElectrical and Electronic EngineeringbusinessComputer networkIEEE Transactions on Vehicular Technology
researchProduct

MAC Protocols for Wake-up Radio: Principles, Modeling and Performance Analysis

2018

[EN] In wake-up radio (WuR) enabled wireless sensor networks (WSNs), a node triggers a data communication at any time instant by sending a wake-up call (WuC) in an on-demand manner. Such wake-up operations eliminate idle listening and overhearing burden for energy consumption in duty-cycled WSNs. Although WuR exhibits its superiority for light traffic, it is inefficient to handle high traffic load in a network. This paper makes an effort towards improving the performance of WuR under diverse load conditions with a twofold contribution. We first propose three protocols that support variable traffic loads by enabling respectively clear channel assessment (CCA), backoff plus CCA, and adaptive …

Computer scienceWireless sensor networks (WSNs)02 engineering and technology01 natural sciencesWake-up radio (WuR)Medium access control (MAC) protocol0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringLatency (engineering)QueueEnergy-efficient communicationbusiness.industryNode (networking)010401 analytical chemistryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsEnergy consumptionINGENIERIA TELEMATICA0104 chemical sciencesComputer Science ApplicationsInternet of Things (IoT)Variable (computer science)Modeling and performance evaluationControl and Systems EngineeringbusinessWireless sensor networkInformation SystemsComputer networkEfficient energy useData transmission
researchProduct

Channel aggregation with guard-band in D-OFDM based CRNs: Modeling and performance evaluation

2016

Channel aggregation (CA) techniques can offer flexible channel allocation and improve overall system performance in multi-channel cognitive radio networks (CRNs). Although many CA techniques have been proposed and studied, the impact of guard-band on CA for channel access has not been addressed in-depth. In this paper, we study the guard-band allocation mechanisms in discontinuous-orthogonal frequency division multiplexing (D-OFDM) based CRNs, and investigate the impact of guard-band sharing on SU flows when CA is enabled. Continuous time Markov chain (CTMC) based models have been developed in order to investigate the stochastic behavior of PU and SU flows. Based on our mathematical analysi…

Channel allocation schemesComputer scienceOrthogonal frequency-division multiplexingDistributed computingBandwidth (signal processing)Guard bandMarkov process020206 networking & telecommunications02 engineering and technologyFrequency-division multiplexingsymbols.namesakeCognitive radio0202 electrical engineering electronic engineering information engineeringsymbols020201 artificial intelligence & image processingSimulationCommunication channel2016 IEEE Wireless Communications and Networking Conference
researchProduct

An Overview of 5G Slicing Operational Business Models for Internet of Vehicles, Maritime IoT Applications and Connectivity Solutions

2021

Identification of ecosystems and Business Models (BM) is an important starting point for new complex system development. The definition of actor (or stakeholder) roles and their interactions (at both business and technical levels), together with target scenarios and use cases, provide essential input information for further system requirement collection and architecture specification. The powerful and flexible Fifth Generation (5G) network slicing technology, which is capable of creating virtually isolated and logically parallel networks, enables a large range of complex services and vertical applications. Although various terminologies and models have been proposed in recent years for BMs …

IoTIoV/V2XService (systems architecture)network slicingGeneral Computer ScienceScope (project management)Standardizationbusiness.industryComputer sciencebusiness models/operational business modelGeneral EngineeringBusiness modelTK1-9971System requirementsIdentification (information)Systems engineeringGeneral Materials ScienceThe InternetUse caseElectrical engineering. Electronics. Nuclear engineeringstakeholder/actors and rolesbusiness5GIEEE Access
researchProduct

Dynamic Spectrum Reservation for CR Networks in the Presence of Channel Failures: Channel Allocation and Reliability Analysis

2018

[EN] Providing channel access opportunities for new service requests and guaranteeing continuous connections for ongoing flows until service completion are two challenges for service provisioning in wireless networks. Channel failures, which are typically caused by hardware and software failures or/and by intrinsic instability in radio transmissions, can easily result in network performance degradation. In cognitive radio networks (CRNs), secondary transmissions are inherently vulnerable to connection breaks due to licensed users' arrivals as well as channel failures. To explore the advantages of channel reservation on performance improvement in error-prone channels, we propose and analyze …

Computer scienceReliability (computer networking)Real-time computingCognitive radio networks02 engineering and technology0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringDynamic channel reservationElectrical and Electronic EngineeringLicensed shared accessCTMCChannel allocation schemesbusiness.industryWireless networkApplied MathematicsQuality of serviceReservation020206 networking & telecommunications020302 automobile design & engineeringINGENIERIA TELEMATICAComputer Science ApplicationsCognitive radioRetainabilitybusinessComputer networkCommunication channel
researchProduct

Link adaptation with combined optimal frame size and rate selection in error-prone 802.11n networks

2008

In error-prone channel with low SNRs, the network throughput may drop significantly if the packet length becomes too large. On the other hand, too much protocol overhead will be introduced if the packet length is too small. In this paper, we study this tradeoff and propose an adaptive frame size algorithm for A-MPDU in 802.11n networks, which can maximize the throughput by selecting the optimized frame length under different channel conditions. When used together with rate selection, the network throughput can be further improved. Both analytical model and simulation results are presented, demonstrating that our algorithm outperforms the fixed length transmission scheme in 802.11n networks …

Protocol overheadComputer scienceNetwork packetReal-time computingPhysical layerBit error rateLink adaptationThroughputFixed lengthFrame size2008 IEEE International Symposium on Wireless Communication Systems
researchProduct

Security in Mobile Wireless Sensor Networks – A Survey

2011

Published version of an article in the journal: Journal of Communications. Also available from the publisher at: http://dx.doi.org/10.4304/jcm.6.2.128-142. OA Thanks to recent advances in robotics, sensors and wireless communications, it is feasible to develop a variety of new architectures for Mobile Wireless Sensor Networks (MWSNs) that play an important role in various applications such as battlefield surveillance, harbor monitoring, etc. However, due to the dynamic of mobile network topology in MWSNs, many new security challenges have emerged. In this article, we give a survey on the state of the art technologies in security aspects of MWSNs. We review existing work that provides securi…

Wi-Fi arrayComputer sciencebusiness.industryWireless networkWireless WANComputer securitycomputer.software_genreKey distribution in wireless sensor networksWireless site surveymobile Wireless Sensor Network security Wireless Sensor NetworkNetwork Access ControlVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Mobile wireless sensor networkElectrical and Electronic EngineeringbusinesscomputerWireless sensor networkComputer networkJournal of Communications
researchProduct

C<sup>2</sup>SMA/CA: Enabling co-channel concurrency in WLANs using positional information

2013

An attractive approach to overcome capacity limitations in a densely deployed WLAN environment is to enable transmission concurrency. In this paper, we propose a co-channel concurrent transmission scheme, referred to as C2SMA/CA, which determines whether to allow multiple concurrent transmissions based on interference estimation using positional information. A distributed multi-link concurrency scheduling algorithm is implemented, and its performance is evaluated through extensive simulations.

Computer sciencebusiness.industryDistributed computingConcurrencyComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSSMA*businessComputer networkScheduling (computing)2013 IEEE Wireless Communications and Networking Conference (WCNC)
researchProduct

Distance-related energy consumption analysis for mobile/relay stations in heterogeneous wireless networks

2010

While the availability of more than one mobile or wireless technologies is enhancing the ubiquity of the Internet access, the corresponding energy consumption effects on mobile station battery for connection selection has not been investigated in depth yet. In this paper, a heterogeneous wireless network, which consists of three constituent networks, is studied with respect to the amount of data communicated and the battery operation time. Four alternative hybrid paths for separate uplink and downlink traffic, each involving more than one network, are analyzed with respect to energy consumption aspects of the mobile (and relay) station. The energy in these paths is analyzed mainly by consid…

business.product_categoryWireless ad hoc networkbusiness.industryComputer scienceWireless networkMobile stationTelecommunications linkHeterogeneous wireless networkInternet accessWirelessEnergy consumptionbusinessComputer network2010 7th International Symposium on Wireless Communication Systems
researchProduct

Priority-oriented multicast transmission schemes for heterogeneous traffic in WSNs

2016

To ensure quality of service (QoS) for heterogeneous traffic in IEEE 802.15.4 based wireless sensor networks (WSNs) is a challenging task since no traffic prioritization mechanism is defined in such WSNs. In this paper, we propose two priority-oriented multicast transmission schemes to provide QoS for heterogeneous traffic in WSNs. Contrary to the legacy CSMA/CA and FIFO principles, these schemes differentiate self-generated or received traffic and give priority to delay-sensitive traffic with respect to channel access and packet scheduling. Simulations are performed in order to assess the performance of these schemes in terms of end-to-end delay, energy consumption, packet delivery ratio, …

Multicast transmissionbusiness.industryNetwork packetFIFO (computing and electronics)Computer scienceQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS05 social sciences050801 communication & media studies020206 networking & telecommunications02 engineering and technologyEnergy consumptionTask (computing)0508 media and communications0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkComputer networkCommunication channel2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)
researchProduct

Performance evaluation of three dynamic channel access strategies for spectrum leasing in CRNs

2015

Spectrum leasing in cognitive radio networks (CRNs) allows the primary network (PN) to lease a certain fraction of its licensed bandwidth to the secondary network (SN). The motivation for such a concept is to enhance the performance of SNs while improving channel utilization. Meanwhile, the license owners of the channels can also gain benefits through spectrum leasing in terms of either monetary rewards or cooperative communications. In this paper, we propose three dynamic channel access strategies for spectrum leasing in multi-channel CRNs. A common characteristic of all these strategies is that the priority for channel access over the leased spectrum is given to SNs and the unleased spect…

Cognitive radioComputer scienceBlocking (radio)business.industrySpectrum (functional analysis)Bandwidth (signal processing)Dynamic channelbusinessComputer networkCommunication channel2015 IEEE International Conference on Communications (ICC)
researchProduct

LCRT: A ToA Based Mobile Terminal Localization Algorithm in NLOS Environment

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/VETECS.2009.5073644 Non line-of-sight (NLOS) propagation in range measurement is a key problem for mobile terminal localization. This paper proposes a low computational residual test (LCRT) algorithm that can identify the number of line-of-sight (LOS) transmissions and reduce the computational com…

Non-line-of-sight propagationTime of arrivalComputational complexity theoryVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Range (statistics)Probability density functionResidualCramér–Rao boundAlgorithmUpper and lower boundsMathematics
researchProduct

An On-Demand Energy Requesting Scheme for Wireless Energy Harvesting Powered IoT Networks

2018

Energy harvesting (EH) delivers a unique technique for replenishing batteries in Internet of Things (IoT) devices. Equipped with an energy harvesting accessory, EH-enabled sensor nodes/IoT devices ...

Scheme (programming language)Computer Networks and Communicationsbusiness.industryComputer science010401 analytical chemistry020206 networking & telecommunications02 engineering and technologyCommunications system01 natural sciences0104 chemical sciencesComputer Science ApplicationsHardware_GENERALHardware and ArchitectureOn demandSignal Processing0202 electrical engineering electronic engineering information engineeringWireless energy harvestingInternet of ThingsbusinessEnergy harvestingcomputerEnergy (signal processing)Information Systemscomputer.programming_languageComputer networkIEEE Internet of Things Journal
researchProduct

Modeling and Performance Analysis of Energy Efficiency Binary Power Control in MIMO-OFDM Wireless Communication Systems

2011

Published version of an article in the journal:International Journal of Distributed Sensor Networks. Also available from Hindawi Publishing: http://dx.doi.org/10.1155/2011/946258 The energy efficiency optimization of the binary power control scheme for MIMO-OFDM wireless communication systems is formulated, and then a global optimization solution of power allocation is derived. Furthermore, a new energy efficiency binary power control (EEBPC) algorithm is designed to improve the energy efficiency of MIMO-OFDM wireless communication systems. Simulation results show that the EEBPC algorithm has better energy efficiency and spectrum efficiency than the average power control algorithm in MIMO-O…

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413Scheme (programming language)Theoretical computer scienceArticle SubjectComputer Networks and CommunicationsComputer scienceBinary numberData_CODINGANDINFORMATIONTHEORY02 engineering and technologylcsh:QA75.5-76.950203 mechanical engineeringVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Computer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringElectronic engineeringGlobal optimizationComputer Science::Information Theorycomputer.programming_languageComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSGeneral Engineering020206 networking & telecommunications020302 automobile design & engineeringSpectral efficiencyMIMO-OFDMPower (physics)lcsh:Electronic computers. Computer sciencecomputerPower controlEfficient energy useInternational Journal of Distributed Sensor Networks
researchProduct

Energy consumption and optimal relay node placement for cooperative retransmissions

2010

Previous work on cooperative MAC design has shown significant performance improvement in terms of throughput and packet delivery ratio. However, little attention has been paid to extra energy cost at the relay node in order to achieve such benefit. In this paper, we focus on analyzing energy consumption at a relay node in cooperative retransmission networks with mixed Rayleigh and Rician fading channels. Furthermore, optimal relay location is studied with respect to energy efficiency in different scenarios. The simulation and calculation results coincide with each other, both showing the optimal location of the relay node is scenario-dependent and can be obtained under given channel conditi…

business.industryComputer scienceRetransmissionNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSThroughputData_CODINGANDINFORMATIONTHEORYEnergy consumptionlaw.inventionComputer Science::PerformanceRelaylawRician fadingComputer Science::Networking and Internet ArchitecturebusinessRelay channelComputer Science::Information TheoryEfficient energy useComputer network2010 7th International Symposium on Wireless Communication Systems
researchProduct

Two novel subjective logic-based in-network data processing schemes in wireless sensor networks

2016

Wireless sensor networks (WSNs) consist of connected low-cost and small-size sensor nodes. The sensor nodes are characterized by various limitations, such as energy availability, processing power, and storage capacity. Typically, nodes collect data from an environment and transmit the raw or processed data to a sink. However, the collected data contains often redundant information. An in-network processing scheme attempts to eliminate or reduce such redundancy in sensed data. In this paper, we propose two in-network data processing schemes for WSNs, which are built based on a lightweight algebra for data processing. The schemes bring also benefits like decreased network traffic load and inc…

021110 strategic defence & security studiesData processingbusiness.industryComputer scienceVisual sensor networkReal-time computing0211 other engineering and technologies020206 networking & telecommunications02 engineering and technologySynthetic dataKey distribution in wireless sensor networks0202 electrical engineering electronic engineering information engineeringMobile wireless sensor networkWirelessbusinessSubjective logicWireless sensor network2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
researchProduct

Complexity analysis of spectrum access strategies with channel aggregation in CR networks

2012

Cognitive radio has been introduced to increase spectrum utilization efficiency. To further improve bandwidth utilization of cognitive radio users, channel aggregation (CA) techniques can be adopted for spectrum access. In this paper, we analyze the complexity of three CA strategies, in terms of required amount of handshakes for channel adaptation due to primary and secondary user activities. Continuous time Markov chain models are developed to evaluate the total number of handshakes required per unit time by different CA strategies and the analytical results are validated by simulations. Numerical results reveal that the complexity of CA strategies depends on the capability and the design …

Cognitive radioComputer scienceDistributed computingSpectrum (functional analysis)Adaptation (computer science)SimulationCommunication channel2012 IEEE Global Communications Conference (GLOBECOM)
researchProduct

Reducing Overhearing Energy in Wake-Up Radio-Enabled WPANs: Scheme and Performance

2018

Wake-up Radio (WuR)-enabled wireless personal area networks (WPANs) are more popular over conventional WPANs thanks to WuR's on-demand transmission feature and overwhelming energy consumption superiority. In a WuRenabled WPAN, overhearing occurs when a wake-up receiver decodes and validates the address of a wake-up call which is not intended to it. However, such overhearing consumes a portion of the required reception energy for unintended nodes. To diminish overhearing thus conserve total reception energy in a network, we propose a bit-by-bit address decoding (BBAD) scheme and compare it with another addressing scheme for WuR that uses a micro-controller unit to decode and match the whole …

Scheme (programming language)Computer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS010401 analytical chemistryTestbed020206 networking & telecommunications02 engineering and technologyEnergy consumption01 natural sciences0104 chemical sciencesTransmission (telecommunications)0202 electrical engineering electronic engineering information engineeringWirelessbusinesscomputerEnergy (signal processing)Decoding methodsComputer networkcomputer.programming_language2018 IEEE International Conference on Communications (ICC)
researchProduct

A continuous-space analytical approach for relay node placement in hybrid cellular and ad hoc networks

2009

A hybrid network is composed of a cellular component and an ad hoc component connected by a relay node, for the purpose of coverage extension and/or capacity improvement. In this paper, we analyze the capacity of such a hybrid network by employing a continuous-space analytical methodology based on circular geometry for uniformly distributed nodes. To achieve maximal overall capacity, the relay node needs to be placed in an optimum location between the base station and the mobile station located at the boundary of the hybrid network. Numerical results show that for obtaining the optimum overall capacity for the hybrid network, the placement of the relay node should be in a range which is nei…

Computer sciencebusiness.industryWireless ad hoc networkNode (networking)Mobile computinglaw.inventionBase stationChannel capacityRelaylawMobile stationComputer Science::Networking and Internet ArchitecturebusinessRelay channelComputer Science::Information TheoryComputer network2009 6th International Symposium on Wireless Communication Systems
researchProduct

Secure and efficient data storage in unattended wireless sensor networks

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/NTMS.2009.5384753 Providing forward and backward secrecy is still a big challenge in Unattended Wireless Sensor Networks (UWSNs), though some storage schemes have been proposed. Additionally, high storage requirement needs efficient storage techniques. In this paper, we propose a novel homomorphic…

Scheme (programming language)business.industryComputer scienceMobile computingHomomorphic encryptionCryptographyComputer data storageSecrecyVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Mobile telephonybusinesscomputerWireless sensor networkcomputer.programming_languageComputer network
researchProduct

Energy Harvesting Powered Packet Transmissions in Duty-Cycled WSNs: A DTMC Analysis

2017

Energy harvesting (EH) promises an extended lifetime for wireless sensor networks (WSNs), supplying sensor nodes with accumulated energy from natural sources. Different from battery powered sensors, nodes in EH-enabled WSNs are equipped with an energy harvesting accessory in order to extract energy from surrounding sources. Based upon the harvested energy, sensor nodes perform data exchange activities. In this paper, we develop two discrete time Markov chain (DTMC) models to analyze the performance of packet transmissions in such a WSN while employing a generic synchronous medium access control (MAC) protocol. Using the proposed DTMC models, we investigate the effect of EH over a specific s…

Markov chainComputer scienceNetwork packetbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS010401 analytical chemistry020206 networking & telecommunicationsThroughput02 engineering and technologyCommunications system01 natural sciences0104 chemical sciencesComputer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringbusinessEnergy harvestingWireless sensor networkEnergy (signal processing)Computer networkGLOBECOM 2017 - 2017 IEEE Global Communications Conference
researchProduct

Throughput and energy efficiency comparison of one-hop, two-hop, virtual relay and cooperative retransmission schemes

2010

Two main types of approaches exist for implementing cooperative communications at the MAC layer: virtual-hop relay and cooperative retransmission. While the virtual-hop relay schemes employ relay nodes to forward packets when higher end-to-end throughput can be achieved compared with the direct transmission, the cooperative retransmission schemes use relays to retransmit data only after the direct transmission fails. However, the performance of the these different approaches has not been compared in the literature, especially when energy efficiency is considered. In order to find out the best transmission scheme, this paper evaluates and compares the performance of the one-hop direct transm…

Routing protocolbusiness.industryNetwork packetWireless networkComputer scienceRetransmissionDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSThroughputData_CODINGANDINFORMATIONTHEORYlaw.inventionComputer Science::PerformanceRelaylawComputer Science::Networking and Internet ArchitectureFadingbusinessComputer Science::Information TheoryComputer networkEfficient energy use2010 European Wireless Conference (EW)
researchProduct

A Scheme for Secure and Reliable Distributed Data Storage in Unattended WSNs

2010

Unattended Wireless Sensor Networks (UWSNs) operated in hostile environments face a risk on data security due to the absence of real-time communication between sensors and sinks, which imposes sensors to accumulate data till the next visit of a mobile sink to off-load the data. Thus, how to ensure forward secrecy, backward secrecy and reliability of the accumulated data is a great challenge. For example, if a sensor is compromised, pre-compromise data accumulated in the sensor is exposed to access. In addition, by holding key secrecy of the compromised sensor, attackers also can learn post-compromise data in the sensor. Furthermore, in practical UWSNs, once sensors stop working for accident…

Computer sciencebusiness.industryForward secrecyReliability (computer networking)Node (networking)SecrecyDistributed data storeProbabilistic logicData securitybusinessWireless sensor networkComputer network2010 IEEE Global Telecommunications Conference GLOBECOM 2010
researchProduct

Evaluation and improvement of collective flooding in WSNs with various link correlations

2015

One of the main challenges confronted by wireless sensor networks (WSNs) is to reduce energy consumption of nodes for the purpose of network lifetime extension. In the literature, many backbone based protocols such as connected dominating set (CDS) and broadcast or multicast based protocols are employed in order to improve network performance in terms of metrics like energy consumption, number of transmissions and dissemination delay. In this paper, we evaluate the performance of a recently proposed transmission protocol known as collective flooding (CF), which is based on link correlation, under various link correlation conditions. Through simulations and analyses we demonstrate that altho…

MulticastComputer sciencebusiness.industryDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSEnergy consumptionNetwork topologyConnected dominating setFlooding (computer networking)Key distribution in wireless sensor networksNetwork performancebusinessWireless sensor networkComputer network2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)
researchProduct

Service discovery protocols in D2D-enabled cellular networks: Reactive versus proactive

2014

Device-to-Device (D2D) communication, which allows access services offered by nearby devices bypassing the base station, has been regarded as an essential component of the emerging 5G mobile networks. Many advantages can be provided by this direct communication paradigm such as high data rate, traffic offloading, range extension, as well as proximity services and social networking. In such a context, service discovery approaches need to be investigated. In this paper, we propose two protocols for service discovery, namely, reactive (pull) discovery and proactive (push) discovery in infrastructure-coordinated D2D networks. The protocol overhead is calculated and numerical results are provide…

Base stationProtocol overheadSocial networkbusiness.industryComputer scienceComponent (UML)Service discoveryCellular networkContext (language use)businessProtocol (object-oriented programming)5GComputer network2014 IEEE Globecom Workshops (GC Wkshps)
researchProduct

Hidden Markov Model Based Machine Learning for mMTC Device Cell Association in 5G Networks

2019

Massive machine-type communication (mMTC) is expected to play a pivotal role in emerging 5G networks. Considering the dense deployment of small cells and the existence of heterogeneous cells, an MTC device can discover multiple cells for association. Under traditional cell association mechanisms, MTC devices are typically associated with an eNodeB with highest signal strength. However, the selected eNodeB may not be able to handle mMTC requests due to network congestion and overload. Therefore, reliable cell association would provide a smarter solution to facilitate mMTC connections. To enable such a solution, a hidden Markov model (HMM) based machine learning (ML) technique is proposed in …

Computer sciencebusiness.industryAssociation (object-oriented programming)Reliability (computer networking)05 social sciences050801 communication & media studiesMachine learningcomputer.software_genreNetwork congestion0508 media and communicationsEnodeB0502 economics and business050211 marketingArtificial intelligenceState (computer science)Hidden Markov modelbusinessVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550computer5GData transmissionICC 2019 - 2019 IEEE International Conference on Communications (ICC)
researchProduct

Spectrum Occupancy and Residual Service Analysis in CRNs Using a Multi-Server Queueing Model

2015

Cognitive radio technology enables secondary users (SUs) to opportunistically access the unused or sparsely utilized spectrum by primary users (PUs) without causing any harmful interference to PUs. Consequently, spectrum occupancy modeling appears as an essential task in cognitive radio networks (CRNs). In this paper, we model spectrum occupancy using a queueing theory based approach in order to evaluate the performance of CRNs in terms of network capacity and number of cognitive radio users waiting for services etc. The queue adopted in this model has variable service capacity and can be considered as a multi-service queue with server failure where each channel acts as a server. When a cha…

Service (business)Queueing theoryTask (computing)Cognitive radioComputer sciencebusiness.industryLayered queueing networkbusinessQueueCommunication channelComputer network2015 IEEE 81st Vehicular Technology Conference (VTC Spring)
researchProduct

A Multi-Relay Cooperative Automatic Repeat Request Protocol in Wireless Networks

2010

This paper proposes a Multi-relay Cooperative Automatic Repeat ReQuest protocol (MC-ARQ) for IEEE 802.11 based wireless networks. The proposed distributed relay selection scheme not only selects the best relays but also solves the collision problem among multiple contending relays, by sorting the relays in the network according to their instantaneous channel quality with the destination node. No prior information or explicit signaling among relay nodes is required. Both analytical and simulation results show that significant benefits can be achieved with the MC-ARQ protocol, compared with both the recently proposed PRCSMA scheme and the original non-cooperative DCF scheme.

business.industrycomputer.internet_protocolComputer scienceWireless networkAutomatic repeat requestDistributed computingNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSThroughputData_CODINGANDINFORMATIONTHEORYlaw.inventionRelaylawWireless lanComputer Science::Networking and Internet ArchitectureWireless Application ProtocolbusinesscomputerComputer Science::Information TheoryComputer networkCommunication channel2010 IEEE International Conference on Communications
researchProduct

Distributed routing and channel allocation in multi-channel multi-hop ad hoc networks

2013

In this paper, we propose a novel routing protocol which is integrated with channel assignment for multi-channel multi-hop wireless ad hoc networks. In such a network, each node is equipped with three transceivers. One is always tuned on a control channel which is responsible for control and broadcast messages, and the other two perform as transmitter and receiver respectively for traffic flows on different data channels. The routing protocol works in an on-demand manner, and the proposed routing discovery process selects a path that potentially traverses nodes with lighter traffic load and lower number of carried flows. With a given number of non-overlapping channels, the optimal solution …

Routing protocolDynamic Source RoutingComputer scienceWireless ad hoc networkDistributed computingEnhanced Interior Gateway Routing ProtocolWireless Routing ProtocolHop (networking)Routing Information ProtocolControl channelDestination-Sequenced Distance Vector routingZone Routing ProtocolStatic routingChannel allocation schemesAdaptive quality of service multi-hop routingbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPath vector protocolAd hoc wireless distribution serviceDistance-vector routing protocolLink-state routing protocolOptimized Link State Routing ProtocolMultipath routingInterior gateway protocolHazy Sighted Link State Routing ProtocolbusinessComputer network2013 IEEE Wireless Communications and Networking Conference (WCNC)
researchProduct

EECDC-MAC: An energy efficient cooperative duty cycle MAC protocol

2012

In this paper, we propose a novel energy efficient cooperative duty cycle MAC (EECDC-MAC) protocol in which sensor nodes use fixed wakeup rendezvous scheduling to exchange messages and a cooperative transmission mechanism to avoid overuse of nodes with lower residual energy. Numerical results demonstrate that the EECDC-MAC protocol can prolong the entire network longevity efficiently in comparison with an existing cooperative duty cycle MAC protocol, CDC-MAC, and another popular duty cycle MAC protocol, prediction wakeup MAC (PW-MAC) protocol.

Internet Protocol Control ProtocolTelecommunication network reliabilitybusiness.industryComputer scienceDuty cycleComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSRendezvousResidual energybusinessWireless sensor networkComputer networkScheduling (computing)Efficient energy use2012 IFIP Wireless Days
researchProduct

Time-Space Domain Availability Analysis Under Reliability Impairments

2019

Availability and reliability are two essential metrics for the design, deployment, and operation of future ultra-reliable low latency communication (URLLC) networks. Despite a vast amount of research efforts toward URLLC, very little attention has been made on the ultra-reliable communication (URC) aspect of URLLC from a dependability perspective. As an effort toward achieving anytime and anywhere communication, this letter consolidates a dependability theory-based availability concept for individual users by taking into account reliability impairments that affect URC in both spatial and temporal domains . To this end, we perform per-user availability analysis by considering channel status …

Reliability theoryWireless networkComputer scienceSoftware deploymentDistributed computingDependabilityGeneral MedicineLatency (engineering)Reliability (statistics)Domain (software engineering)Communication channelIEEE Networking Letters
researchProduct

Frame Based Equipment Medium Access in LTE-U: Mechanism Enhancements and DTMC Modeling

2017

To address the challenge of ever-growing data rate demand and benefit from the popularity of WiFi capability in mobile phones, 3GPP is studying techniques which enable the coexistence of WiFi and LTE in the unlicensed band, known as LTEU. Two flavors of the listen before talk (LBT) principle, referred to as load based equipment (LBE) and frame based equipment (FBE), are recommended by 3GPP. In this paper, we investigate two enhanced FBE mechanisms, i.e., 1) enhanced FBE (E-FBE); and 2) backoff and idle time reduction FBE (BITR-FBE) for the purpose of improving FBE. After presenting the idea of E-FBE, we propose BITR-FBE which can further improve throughput, shorten delay and reduce energy c…

Markov chainComputer sciencebusiness.industryMarkov process020206 networking & telecommunicationsThroughput02 engineering and technologyEnergy consumptionMarkov modelReduction (complexity)symbols.namesakeTransmission (telecommunications)0202 electrical engineering electronic engineering information engineeringsymbolsbusinessHeterogeneous networkComputer networkGLOBECOM 2017 - 2017 IEEE Global Communications Conference
researchProduct

Energy Efficient Consecutive Packet Transmissions in Receiver-Initiated Wake-Up Radio Enabled WSNs

2018

In wake-up radio (WuR)-enabled wireless sensor networks, data communication among nodes is triggered in an on-demand manner, by either a sender or a receiver. For receiver-initiated WuR (RI-WuR), a receiving node wakes up sending nodes through a wake-up call. Correspondingly sending nodes transmit packets in a traditional way by competing with one another multiple times in a single operational cycle. In this paper, we propose a receiver-initiated consecutive packet transmission WuR (RI-CPT-WuR) medium access control (MAC) protocol, which eliminates multiple competitions to achieve higher energy efficiency. Furthermore, we develop two associated discrete time Markov chains (DTMCs) for evalua…

Markov chainbusiness.industryNetwork packetComputer scienceReliability (computer networking)Node (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020208 electrical & electronic engineering020206 networking & telecommunicationsThroughput02 engineering and technologyEnergy consumptionCommunications system0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringbusinessInstrumentationWireless sensor networkComputer networkEfficient energy useIEEE Sensors Journal
researchProduct

A Stochastic Routing Algorithm for Distributed IoT with Unreliable Wireless Links

2016

Punctual and reliable transmission of collected information is indispensable for many Internet of Things (IoT) applications. Such applications rely on IoT devices operating over wireless communication links which are intrinsically unreliable. Consequently to improve packet delivery success while reducing delivery delay is a challenging task for data transmission in the IoT. In this paper, we propose an improved distributed stochastic routing algorithm to increase packet delivery ratio and decrease delivery delay in IoT with unreliable communication links. We adopt the concept of absorbing Markov chain to model the network and evaluate the expected delivery ratio and expected delivery delay …

020203 distributed computingbusiness.industryComputer scienceNetwork packetDistributed computingReliability (computer networking)020206 networking & telecommunications02 engineering and technologyAbsorbing Markov chain0202 electrical engineering electronic engineering information engineeringWirelessRouting (electronic design automation)businessAlgorithmWireless sensor networkData transmissionComputer network2016 IEEE 83rd Vehicular Technology Conference (VTC Spring)
researchProduct

Enabling Retransmissions for Achieving Reliable Multicast Communications in WSNs

2016

To ensure end-to-end reliable multicast or broadcast transmissions in IEEE 802.15.4 based wireless sensor networks WSNs) is a challenging task since no retransmission and acknowledgment mechanisms are defined in such WSNs. In this paper, we propose three retransmission enabled multicast transmission schemes in order to achieve reliable packet transmissions in such networks. Different from the legacy CSMA/CA principle, these schemes allow a sending or forwarding node to retransmit a packet if necessary and enable implicit or/and explicit acknowledgment for multicast services. Simulations are performed in order to assess the performance of these schemes in terms of number of retransmissions, …

Multicast transmissionProtocol Independent MulticastMulticastbusiness.industryNetwork packetComputer scienceDistributed computingRetransmissionComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsData_CODINGANDINFORMATIONTHEORY02 engineering and technologyEnergy consumptionKey distribution in wireless sensor networksSource-specific multicastPacket lossReliable multicast0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingXcastbusinessWireless sensor networkPragmatic General MulticastComputer network2016 IEEE 83rd Vehicular Technology Conference (VTC Spring)
researchProduct

Power allocation in multi-channel cognitive radio networks with channel assembling

2011

Accepted version of a paper in the book: 2011 IEEE 12th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). Published version available from the IEEE:http://dx.doi.org/10.1109/SPAWC.2011.5990485 Consider power allocation for Secondary User (SU) packet transmissions over multiple channels with variable Primary User (PU) arrival rates in cognitive radio networks. Two problems are studied in this paper: The first one is to minimize the collision probability with PUs and the second one is to maximize the data rate while keeping the collision probability bounded. It is shown that the optimal solution for the first problem is to allocate all power onto the bes…

Mathematical optimizationComputer sciencebusiness.industryNetwork packet020206 networking & telecommunications02 engineering and technologyPower budgetPower (physics)Dynamic programmingVariable (computer science)Cognitive radioBounded functionVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 5520202 electrical engineering electronic engineering information engineeringbusinessComputer networkCommunication channel
researchProduct

An optimal energy efficient cooperative retransmission MAC scheme in wireless networks

2011

While the benefits of cooperative diversity have been well studied in the literature, cooperative MAC protocol design has also attracted much attention recently. In the single-relay Cooperative Automatic Repeat reQuest (C-ARQ) protocol, the best relay node is selected in a distributed manner by relays using different backoff time before packet retransmission. However, this relay selection scheme does not work efficiently in a dense network scenario, due to possible high collision probability among different contending relays. In this paper, we propose an optimized relay selection scheme to maximize system energy efficiency by reducing collision probability. The energy efficiency performance…

business.industryComputer scienceWireless networkNetwork packetRetransmissionDistributed computingAutomatic repeat requestNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSData_CODINGANDINFORMATIONTHEORYlaw.inventionCooperative diversityRelaylawComputer Science::Networking and Internet ArchitecturebusinessRelay channelComputer Science::Information TheoryComputer network2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE)
researchProduct

Event-Triggered Sleeping for Synchronous DC MAC IN WSNs: Mechanism and DTMC Modeling

2016

Overhearing and idle listening are two primary sources for unnecessary energy consumption in wireless sensor networks. Although introducing duty cycling in medium access control (MAC) reduces idle listening, it cannot avoid overhearing in a network with multiple contending nodes. In this paper, we propose an event-triggered sleeping (ETS) mechanism for synchronous duty-cycled (DC) MAC protocols in order to avoid overhearing when a node is not active. This ETS mechanism applies to any synchronous DC MAC protocols and makes them more energy efficient. Furthermore, we develop a two dimensional discrete time Markov chain model to evaluate the performance of the proposed ETS mechanism by integra…

Markov chainNetwork packetbusiness.industryComputer scienceNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications02 engineering and technologyEnergy consumptionSynchronization0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessWireless sensor networkComputer networkEfficient energy use2016 IEEE Global Communications Conference (GLOBECOM)
researchProduct

Enabling early sleeping and early data transmission in wake-up radio-enabled IoT networks

2019

Abstract Wireless sensor networks (WSNs) are one of the key enabling technologies for the Internet of things (IoT). In such networks, wake-up radio (WuR) is gaining its popularity thanks to its on-demand transmission feature and overwhelming energy consumption superiority. Despite this advantage, overhearing still occurs when a wake-up receiver decodes the address of a wake-up call (WuC) which is not intended to it, causing a certain amount of extra energy waste in the network. Moreover, long latency may occur due to WuC address decoding since WuCs are transmitted at a very low data rate. In this paper, we propose two schemes, i.e., early sleeping (ES) and early data transmission (EDT), to …

Computer Networks and Communicationsbusiness.industryNetwork packetComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTestbedLatency (audio)020206 networking & telecommunications02 engineering and technologyEnergy consumptionTransmission (telecommunications)0202 electrical engineering electronic engineering information engineeringKey (cryptography)020201 artificial intelligence & image processingbusinessWireless sensor networkVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Computer networkData transmission
researchProduct

A service-oriented routing scheme with load balancing in wireless mesh networks

2008

Wireless mesh networks will play an important role in the next-generation wireless communication systems as it can provide wide coverage and scalable broadband Internet access services. However, congestion in such networks may lead to throughput degradation, packet loss and longer transmission delay. Therefore, routing and traffic forwarding schemes which are aware of the congestion status of a wireless network can efficiently improve network performance. In this paper, we propose a new congestion-aware routing scheme which may direct different paths for different services types, according to network congestion status. The goal of this routing scheme is to use traffic load metric for choosi…

Static routingDynamic Source RoutingWireless mesh networkComputer sciencebusiness.industryEqual-cost multi-path routingDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWireless Routing ProtocolGeographic routingLink-state routing protocolbusinessHierarchical routingComputer network2008 IEEE International Symposium on Wireless Communication Systems
researchProduct

A system-level power saving approach for cellular networks with microcells/picocells

2011

Network power consumption reduction has recently become an active research topic. In this paper, we propose a novel approach to save power consumption of a three-cell microcellular network. When the traffic load in the middle cell is low, it can be switched-off and its users are covered. This is enabled by increasing the transmission power of one sector antenna in the two neighboring cells. Numerical results show that by increasing antenna transmission power of the two sectors, the overall network power consumption can be reduced.

Reduction (complexity)Transmission (telecommunications)business.industryComputer scienceCellular networkPower savingSystem levelSector antennaAntenna (radio)businessPower (physics)Computer network2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE)
researchProduct

Does Wake-Up Radio Always Consume Lower Energy Than Duty-Cycled Protocols?

2017

Many recent studies anticipate that wake-up radio (WuR) will replace traditional duty-cycled (DC) protocols given its overwhelming performance superiority on energy consumption. Meanwhile, the question on whether WuR performs always better than DC protocols has not been answered explicitly. In this paper, we investigate in-depth the energy consumption performance of WuR by considering various levels of traffic load in a wireless sensor network. By comparing SCM-WuR with both synchronous MAC (S-MAC) and asynchronous MAC (X-MAC), we ascertain that SCM-WuR does consume orders of magnitude lowerenergythanDCprotocolswhentrafficloadislow.Howe ver, our numerical results reveal at the same time that …

Computer sciencebusiness.industrymedia_common.quotation_subject020208 electrical & electronic engineering020206 networking & telecommunications02 engineering and technologyEnergy consumptionWakeSynchronizationOrders of magnitude (bit rate)Asynchronous communicationRange (aeronautics)0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkDutymedia_commonComputer network2017 IEEE 86th Vehicular Technology Conference (VTC-Fall)
researchProduct

Per-user availability for ultra-reliable communication in 5G: Concept and analysis

2018

Emerging 5G mobile networks envisage ultra-reliable communication (URC) as one of the major requirements for anytime anywhere communication. Although URC has recently attracted a lot of attention in the research community, existing work seems to rely on approaching reliability merely from a time domain perspective. However, both time and space domain parameters affect reliability and need to be investigated. This paper introduces a dependability theory based definition for per-user availability targeted at 5G networks. The advocated definition promotes both space and time domain components for URC provisioning. Furthermore, we perform reliability and availability analysis and simulations co…

Reliability theoryComputer scienceReliability (computer networking)Distributed computing05 social sciences050801 communication & media studies020206 networking & telecommunicationsProvisioning02 engineering and technologyDomain (software engineering)Theory based0508 media and communications0202 electrical engineering electronic engineering information engineeringDependability5G2018 IEEE Wireless Communications and Networking Conference (WCNC)
researchProduct

Aggregated Packet Transmission in Duty-Cycled WSNs: Modeling and Performance Evaluation

2017

[EN] Duty cycling (DC) is a popular technique for energy conservation in wireless sensor networks (WSNs) that allows nodes to wake up and sleep periodically. Typically, a single-packet transmission (SPT) occurs per cycle, leading to possibly long delay. With aggregated packet transmission (APT), nodes transmit a batch of packets in a single cycle. The potential benefits brought by an APT scheme include shorter delay, higher throughput, and higher energy efficiency. In the literature, different analytical models have been proposed to evaluate the performance of SPT schemes. However, no analytical models for the APT mode on synchronous DC medium access control (MAC) mechanisms exist. In this …

EngineeringTransmission delayComputer Networks and CommunicationsRetransmissionReal-time computingAerospace EngineeringThroughput02 engineering and technology01 natural sciencesDiscrete-time Markov chain (DTMC) modelPacket switchingPacket lossComputer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringProcessing delaybusiness.industryNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS010401 analytical chemistry020206 networking & telecommunicationsINGENIERIA TELEMATICA0104 chemical sciencesComputer Science::PerformancePacket aggregationAutomotive EngineeringPerformance evaluationDuty-cycled wireless sensor networksPacket aggregationbusinessComputer network
researchProduct

Priority Enabled Grant-Free Access With Dynamic Slot Allocation for Heterogeneous mMTC Traffic in 5G NR Networks

2021

Although grant-based mechanisms have been a predominant approach for wireless access for years, the additional latency required for initial handshake message exchange and the extra control overhead for packet transmissions have stimulated the emergence of grant-free (GF) transmission. GF access provides a promising mechanism for carrying low and moderate traffic with small data and fits especially well for massive machine type communications (mMTC) applications. Despite a surge of interest in GF access, how to handle heterogeneous mMTC traffic based on GF mechanisms has not been investigated in depth. In this paper, we propose a priority enabled GF access scheme which performs dynamic slot …

business.industryComputer scienceNetwork packet05 social sciencesMarkov process050801 communication & media studies020206 networking & telecommunications02 engineering and technologyDynamic priority schedulingsymbols.namesake0508 media and communicationsSubframeTransmission (telecommunications)0202 electrical engineering electronic engineering information engineeringsymbolsOverhead (computing)WirelessElectrical and Electronic EngineeringbusinessVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 5505GComputer networkIEEE Transactions on Communications
researchProduct

Enable concurrent transmissions with beamforming for broadband wireless access in CSMA/CA-based WLANs

2014

In CSMA/CA based wireless local networks, two stations are not allowed to transmit at the same time due to interference generated to each other, resulting in degraded throughput. Concurrent transmission, which enables simultaneous transmission of two or more stations under certain conditions, is able to overcome this problem, leading to enhanced channel utilization efficiency. Different from earlier work on this topic which focuses on omni-direction concurrent transmission, we introduce in this paper beamforming into a co-channel concurrent transmission scheme and investigate the benefits of concurrency with beamforming. The circumstances for concurrent transmission and frame scheduling are…

BeamformingWireless broadbandbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWirelessThroughputData_CODINGANDINFORMATIONTHEORYbusinessCarrier sense multiple access with collision avoidanceComputer networkCommunication channelScheduling (computing)2014 IEEE Globecom Workshops (GC Wkshps)
researchProduct

An Efficient, Robust, and Scalable Trust Management Scheme for Unattended Wireless Sensor Networks

2012

Unattended Wireless Sensor Networks (UWSNs) are characterized by long periods of disconnected operation and fixed or irregular intervals between visits by the sink. The absence of an online trusted third party, i.e., an on-site sink, makes existing trust management schemes used in legacy wireless sensor networks not applicable to UWSNs directly. In this paper, we propose a trust management scheme for UWSNs to provide efficient, robust and scalable trust data storage. For trust data storage, we employ geographic hash table to efficiently identify data storage nodes and to significantly reduce storage cost. We demonstrate, through detailed analyses and extensive simulations, that the proposed…

Key distribution in wireless sensor networksComputer sciencebusiness.industryRobustness (computer science)Wireless ad hoc networkDistributed computingComputer data storageScalabilityTrusted ComputingTrusted third partybusinessWireless sensor networkComputer network2012 IEEE 13th International Conference on Mobile Data Management
researchProduct

Broadband Internet Access via Multi-Hop Wireless Mesh Networks: Design, Protocol and Experiments

2010

Published version of an article from the journal: Wireless Personal Communications. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s11277-009-9907-9 While bandwidth for Internet access in urban areas is steadily increasing in recent years, many rural areas are still suffering from the effect of the digital divide. This paper presents a broadband Internet access paradigm developed in the context of the ADHOCSYS project, which was financed by the European Commission under the 6th Framework Program Information and Society Technologies, within the strategic objective of Broadband for All. Aiming at providing reliable Internet access in rural and mountainous regi…

Routing protocolbusiness.product_categoryBroadband networksComputer scienceMesh networkingHop (networking)law.inventionlawVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552BroadbandInternet accessWi-FiElectrical and Electronic EngineeringVDP::Mathematics and natural science: 400::Information and communication science: 420::Communication and distributed systems: 423Network architectureWireless mesh networkbusiness.industryWireless networkQuality of serviceWireless WANOrder One Network ProtocolComputer Science ApplicationsInternet Connection SharingDigital subscriber lineNetwork access pointHazy Sighted Link State Routing ProtocolRural areabusinessTelecommunicationsMunicipal wireless networkComputer network
researchProduct

Energy-Efficient Binary Power Control with Bit Error Rate Constraint in MIMO-OFDM Wireless Communication Systems

2012

Motivated by the demand for energy efficiency improvement in mobile communication industry, we explore an idea of optimizing energy efficiency for MIMO-OFDM wireless communication systems while maintaining users' quality of service (QoS) requirement. Based on the binary power control scheme,a power allocation criterion for energy efficiency optimization is derived under the total power constraint. From a bit error rate (BER) point of view, a protection constraint is configured to guarantee the system QoS. With the aim of energy efficiency optimization under QoS guarantee in MIMO-OFDM wireless communication systems, an energy-efficient binary power control with BER constraint (EBPCB) algorith…

Computer sciencebusiness.industryOrthogonal frequency-division multiplexingQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMIMO-OFDMComputer Science::PerformanceConstraint (information theory)Computer Science::Networking and Internet ArchitectureBit error rateElectronic engineeringMobile telephonybusinessComputer Science::Information TheoryEfficient energy usePower control2012 IEEE Vehicular Technology Conference (VTC Fall)
researchProduct

Cell Association for MTC Devices in 5G Networks: Schemes and Performance Evaluation

2021

Fifth generation (5G) networks offer tremendous opportunities for Internet of things applications by facilitating massive machine-type communications (MTC). As many MTC devices are battery powered and intend to stay often in the sleep or power-saving mode, cell (re)association needs to be performed when a device wakes up. On the other hand, 5G networks are usually deployed as heterogeneous networks consisting of both macro and small cells under which a single device may be covered by multiple radio access technologies (RATs) simultaneously. Therefore, it is imperative to design effective cell association schemes for the purpose of efficient connectivity and resource utilization, especially …

Battery (electricity)Scheme (programming language)Computer sciencebusiness.industryAssociation (object-oriented programming)Association schemeHandoverMacrobusinesscomputer5GHeterogeneous networkcomputer.programming_languageComputer network2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit)
researchProduct

Cooperative Medium Access Control in Wireless Networks: The Two-Hop Case

2009

Cooperative communication has been recently proposed as a powerful means to improve network performance in wireless networks. However, most existing work focuses solely on one-hop source-destination cooperation. In this paper, we propose a novel cooperative MAC mechanism that is specially designed for two-hop cooperation communications where the source node and the destination node cannot hear each other directly. In this case, cooperative communication is operated in a two-hop manner and transmit-diversity is achieved by the reception of the same data packet forwarded through multiple relays towards a single destination. The proposed scheme employs an efficient relay selection algorithm to…

business.industryComputer scienceWireless networkNetwork packetDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSAccess controlCooperative diversitylaw.inventionTransmit diversityRelaylawComputer Science::Networking and Internet ArchitectureNetwork performancebusinessSelection algorithmComputer Science::Information TheoryComputer network2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
researchProduct

Priority-based initial access for URLLC traffic in massive IoT networks: Schemes and performance analysis

2020

Abstract At a density of one million devices per square kilometer, the10’s of billions of devices, objects, and machines that form a massive Internet of things (mIoT) require ubiquitous connectivity. Among a massive number of IoT devices, a portion of them require ultra-reliable low latency communication (URLLC) provided via fifth generation (5G) networks, bringing many new challenges due to the stringent service requirements. Albeit a surge of research efforts on URLLC and mIoT, access mechanisms which include both URLLC and massive machine type communications (mMTC) have not yet been investigated in-depth. In this paper, we propose three novel schemes to facilitate priority-based initial …

Scheme (programming language)Service (systems architecture)Computer Networks and CommunicationsComputer sciencebusiness.industryReliability (computer networking)Frame (networking)020206 networking & telecommunications02 engineering and technologyTransmission (telecommunications)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingLatency (engineering)businesscomputerVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 5505GRandom accesscomputer.programming_languageComputer network
researchProduct

DTMC modeling for performance evaluation of DW-MAC in wireless sensor networks

2016

Synchronized duty cycling (DC) aligns sensor nodes to wake up at the same time in order to reduce idle listening for medium access control (MAC) in wireless sensor networks (WSNs). Demand wakeup MAC (DW-MAC) is a popular synchronous DC MAC protocol which allows nodes to compete and transmit multiple packets in one operational cycle. This multiple packet transmission (MPT) feature makes DW-MAC more energy efficient when comparing with other existing single time competition based protocols such as sensor MAC (S-MAC). In the literature, no analytical model exists to evaluate the performance of DW-MAC. In this paper, we develop two associated discrete time Markov chain (DTMC) models and incorpo…

business.industryComputer scienceNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS010401 analytical chemistryReal-time computing020206 networking & telecommunications02 engineering and technologyEnergy consumption01 natural sciencesSynchronization0104 chemical sciencesComputer Science::PerformanceKey distribution in wireless sensor networksComputer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringMobile wireless sensor networkMultiple Access with Collision Avoidance for WirelessbusinessWireless sensor networkComputer Science::Information TheoryEfficient energy useComputer network2016 IEEE Wireless Communications and Networking Conference
researchProduct

Cooperative or non-cooperative transmission in synchronous DC WSNs: A DTMC-based approach

2017

Cooperative transmission (CT) enables balanced energy consumption among sensor nodes and mitigates the energy hole problem in wireless sensor networks (WSNs). In typical CT enabled medium access control (MAC) protocols, a source node decides to trigger CT or not based on a residual energy comparison between itself and its relay node. In this paper, we propose a receiver initiated CT MAC protocol, in which the receiving node makes the decision on initiating CT or not based on a tradeoff between performing CT and non-CT. In this way, nodes can avoid idle listening and achieve an extended lifetime. A discrete-time Markov chain (DTMC) model is developed to analyze the performance of CT associat…

Computer sciencebusiness.industryNode (networking)05 social sciencesReal-time computing050801 communication & media studies020206 networking & telecommunications02 engineering and technologyEnergy consumptionSynchronizationlaw.invention0508 media and communicationsTransmission (telecommunications)RelaylawComputer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkEnergy (signal processing)Computer networkEfficient energy use2017 IEEE International Conference on Communications (ICC)
researchProduct

Ultra-Low Power Wake-up Radio for 5G IoT

2019

5G Internet of Things (5G IoT), which is currently under development by 3GPP, paves the way for connecting diverse categories of devices to the IoT via cellular networks. For battery-powered low-cost IoT devices, wake-up radio (WuR) appears as an eminent technique for prolonging the lifetime of such devices, thanks to its outstanding energy consumption performance. However, only some small-size battery-powered IoT devices are able to transmit to a cellular IoT base station (BS) directly. In this article, we present W2B-IoT, a prototype implementation of a WuR-based two-tier system, which bridges cellular IoT BS and WuR via a Bluetooth low energy (BLE)-enabled Android smartphone. Such a WuR-…

Computer Networks and Communicationscomputer.internet_protocolComputer sciencebusiness.industryVDP::Technology: 500::Information and communication technology: 550020206 networking & telecommunications02 engineering and technologyEnergy consumptionComputer Science ApplicationsBase station0202 electrical engineering electronic engineering information engineeringCellular networkElectrical and Electronic EngineeringAndroid (operating system)Internet of Thingsbusinesscomputer5GBluetooth Low EnergyComputer network
researchProduct

Modeling and Performance Analysis of Channel Assembling in Multichannel Cognitive Radio Networks With Spectrum Adaptation

2012

[EN] To accommodate spectrum access in multichannel cognitive radio networks (CRNs), the channel-assembling technique, which combines several channels together as one channel, has been proposed in many medium access control (MAC) protocols. However, analytical models for CRNs enabled with this technique have not been thoroughly investigated. In this paper, two representative channel-assembling strategies that consider spectrum adaptation and heterogeneous traffic are proposed, and the performance of these strategies is evaluated based on the proposed continuous-time Markov chain (CTMC) models. Moreover, approximations of these models in the quasistationary regime are analyzed, and closed-fo…

Computer Networks and CommunicationsComputer scienceAerospace EngineeringMarkov process02 engineering and technologyContinuous-time Markov chain (CTMC) modelsChannel assemblingsymbols.namesake0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringCognitive radio networks (CRNs)Electrical and Electronic EngineeringAdaptation (computer science)SimulationMarkov chainPerformance analysisSpectrum (functional analysis)020206 networking & telecommunications020302 automobile design & engineeringINGENIERIA TELEMATICACognitive radioAutomotive EngineeringsymbolsSpectrum adaptationAlgorithmCommunication channelIEEE Transactions on Vehicular Technology
researchProduct

Performance Analysis of Synchronous Duty-Cycled MAC Protocols

2015

In this letter, we propose an analytical model to evaluate the performance of the S-MAC protocol. The proposed model improves the accuracy of previous models in two aspects. First, it incorporates the dependence among the nodes within a cluster by defining a DTMC that models the number of active nodes, whereas the previous models considered that nodes were mutually independent. Second, it proposes new methods for calculating packet delay and energy consumption. The analytical model is validated through discrete-event based simulations. Numerical results demonstrate that the proposed analytical model and methods yield accurate results under realistic assumptions

Protocol (science)Markov modelingMarkov chainComputer scienceNetwork packetLoad modelingReal-time computingEnergy consumptionINGENIERIA TELEMATICAMarkov modelWSNsDelay and energy consumptionControl and Systems EngineeringPacket lossDuty-cycled MAC protocolsCluster (physics)Electrical and Electronic EngineeringAlgorithm
researchProduct

Subjective Logic-Based In-Network Data Processing for Trust Management in Collocated and Distributed Wireless Sensor Networks

2018

While analyzing an explosive amount of data collected in today’s wireless sensor networks (WSNs), the redundant information in the sensed data needs to be handled. In-network data processing is a technique which can eliminate or reduce such redundancy, leading to minimized resource consumption. On the other hand, trust management techniques establish trust relationships among nodes and detect unreliable nodes. In this paper, we propose two novel in-network data processing schemes for trust management in static WSNs. The first scheme targets at networks, where sensor nodes are closely collocated to report the same event. Considering both spatial and temporal correlations, this scheme generat…

021110 strategic defence & security studiesComputer scienceNode (networking)Reliability (computer networking)Distributed computing0211 other engineering and technologies020206 networking & telecommunications02 engineering and technologyEnergy consumptionSensor node0202 electrical engineering electronic engineering information engineeringRedundancy (engineering)Trust management (information system)Electrical and Electronic EngineeringSubjective logicInstrumentationWireless sensor networkIEEE Sensors Journal
researchProduct

Lightweight Relay Selection in Multi-Hop Wake-Up Radio Enabled IoT Networks

2018

Wake-up Radios (WuRs) are becoming more popular in Internet of Things (IoT) networks owing to their overwhelming advantages such as low latency, high energy saving, and on-demand communication. In a multi-hop WuR-IoT network, route establishment between source and destination prior to actual data communications consumes a significant portion of energy. To reduce energy consumption and protocol overhead for route establishment, we propose a lightweight relay (LR) selection scheme, referred to as LR-WuR, where a lookup table and acknowledgment are used for next hop relay selection. We develop an analytical model to evaluate the performance of LR-WuR. Extensive simulations are performed to val…

business.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020208 electrical & electronic engineering020206 networking & telecommunications02 engineering and technologyEnergy consumptionWakelaw.inventionHop (networking)Protocol overheadRelaylaw0202 electrical engineering electronic engineering information engineeringbusinessInternet of ThingsComputer network2018 IEEE Global Communications Conference (GLOBECOM)
researchProduct

A distributed data storage and retrieval scheme in unattended WSNs using Homomorphic Encryption and secret sharing

2009

Many data storage schemes have been proposed in the past for keeping dependable data storage, but they are not designed for Unattended Wireless Sensor Networks (UWSNs). When applying these schemes to UWSNs, most of them have limitations such as high storage requirement, transmission cost, and not resilient to a large number of node compromises. To address the problem of data storage, transmission cost, and resilience of node compromise in UWSNs, we propose a novel Homomorphic Encryption and Homomorphic Secret Sharing based scheme (HEHSS) to accomplish the goals of confidentiality, resilience to node compromises, reliability, and efficiency of storage and transmission. Our scheme exploits th…

Homomorphic secret sharingbusiness.industryComputer scienceNode (networking)Distributed data storeHomomorphic encryptionCryptographybusinessEncryptionSecret sharingWireless sensor networkComputer network2009 2nd IFIP Wireless Days (WD)
researchProduct

OLSR Mesh Networks for Broadband Access: Enhancements, Implementation and Deployment

2008

In the context of an EU FP6 project, ADHOCSYS, we have developed a reliable and cost-effective solution for broadband Internet access in rural and mountainous areas. This solution is built based on multi-hop wireless mesh networking technologies and covers many aspects such as routing, reliability, QoS, security, self-configuration, self-healing, remote network monitoring, power management etc. In this paper, we present solely the routing aspect of the developed mesh network, focusing on new routing features that have been designed, implemented, and deployed in a real-life operational network. These new features are developed based on an extended version of the OLSR protocol. The test resul…

EngineeringDynamic Source RoutingWireless mesh networkbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMultipath routingPolicy-based routingMesh networkingOrder One Network ProtocolHazy Sighted Link State Routing ProtocolAd hoc wireless distribution servicebusinessComputer network2008 4th IEEE International Conference on Circuits and Systems for Communications
researchProduct

A dynamic channel access strategy for underlay cognitive radio networks: Markov modelling and performance evaluation

2015

Unlike in overlay cognitive radio networks, secondary users in underlay cognitive radio networks can access licensed spectrum even at the presence of a primary user, given that the interference caused by the secondary transmission is lower than a pre-specified threshold. Based on this underlay access principle, we propose in this paper a dynamic channel access strategy for multi-channel cognitive radio networks. Different from existing underlay access techniques, channel assembling, spectrum adaptation and restricted channel occupancy are also considered in the proposed strategy in order to achieve better performance in the secondary network. Accordingly, a partial channel occupancy mode, w…

EngineeringMarkov chainbusiness.industryBlocking (radio)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020302 automobile design & engineering020206 networking & telecommunications02 engineering and technologyOverlayCognitive radio0203 mechanical engineeringTransmission (telecommunications)Interference (communication)0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringUnderlaybusinessCommunication channelComputer networkTransactions on Emerging Telecommunications Technologies
researchProduct

An efficient Chinese remainder theorem based node capture resilience scheme for Mobile WSNs

2010

Node capture attack is a critical issue in Mobile WSNs where attacker-controlled replicas may act maliciously. In this paper, we present a novel Chinese remainder theorem based node capture resilience scheme that can be utilized to discover and revoke captured nodes. Moreover, our scheme can limit the ability of captured nodes to further compromise forward security, backward security, and launch collusion attacks. Detailed analysis shows that our scheme indeed achieves the expected design goals.

Mobile radiobusiness.industryForward secrecyComputer scienceNode (networking)Mobile computingCryptographyMobile telephonybusinessResilience (network)Chinese remainder theoremComputer network2010 IEEE International Conference on Information Theory and Information Security
researchProduct

A Single radio based channel datarate-aware parallel rendezvous MAC protocol for cognitive radio networks

2009

Channel hopping based parallel rendezvous multichannel MAC protocols have several advantages since they do not need a control channel, require only one transceiver, and produce higher system capacity. However, channel hopping sequences in existing parallel rendezvous MAC protocols have been designed as irrelevant to channel datarates, leading to under-utilization of channel resources in multi-rate multi-channel networks. Considering that datarates among channels may be different, we propose a dynamic parallel rendezvous multichannel MAC protocol for synchronized cognitive radio networks in which the secondary users adjust their own distinct hopping sequences according to the datarates of th…

Markov chainComputer sciencebusiness.industryDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSRendezvousMarkov processData_CODINGANDINFORMATIONTHEORYsymbols.namesakeCognitive radioControl channelsymbolsTransceiverbusinessProtocol (object-oriented programming)Computer networkCommunication channel2009 IEEE 34th Conference on Local Computer Networks
researchProduct

Formal verification of a Cooperative Automatic Repeat reQuest MAC protocol

2012

Author's version of an article published in the journal: Computer Standards & Interfaces. Also available from the publisher at: http://dx.doi.org/10.1016/j.csi.2011.12.001 Cooperative communications, in which a relay node helps the source node to deliver its packets to the destination node, are able to obtain significant benefits in terms of transmission reliability, coverage extension and energy efficiency. A Cooperative Automatic Repeat reQuest (C-ARQ) MAC protocol has been recently proposed to exploit cooperative diversity at the MAC layer. in this paper, we validate the integrity and the validity of the C-ARQ protocol using formal methods. The protocol logic is modeled in SDL and implem…

Internet Protocol Control Protocolcomputer.internet_protocolComputer scienceVDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 422Distributed computingAutomatic repeat requestGeneral Inter-ORB ProtocolData_CODINGANDINFORMATIONTHEORYInternet protocol suitefinite model-checkingComputer Science::Networking and Internet ArchitecturePROMELAComputer Science::Information Theorybusiness.industryNode (networking)Link Control ProtocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKScooperative communicationsCooperative diversityprotocol verificationHardware and ArchitecturebusinessLawcomputerSoftwareReverse Address Resolution ProtocolComputer networkComputer Standards & Interfaces
researchProduct

Joint Optimization of Detection Threshold and Resource Allocation in Infrastructure-based Multi-band Cognitive Radio Networks

2012

[EN] Consider an infrastructure-based multi-band cognitive radio network (CRN) where secondary users (SUs) opportunistically access a set of sub-carriers when sensed as idle. The carrier sensing threshold which affects the access opportunities of SUs is conventionally regarded as static and treated independently from the resource allocation in the model. In this article, we study jointly the optimization of detection threshold and resource allocation with the goal of maximizing the total downlink capacity of SUs in such CRNs. The optimization problem is formulated considering three sets of variables, i.e., detection threshold, sub-carrier assignment and power allocation, with constraints on…

Mathematical optimizationOptimization problemComputer scienceComputer Networks and Communications020208 electrical & electronic engineeringReal-time computing020206 networking & telecommunications02 engineering and technologyINGENIERIA TELEMATICAPower budgetComputer Science ApplicationsMulti-band cognitive radio networksBase stationCognitive radioTelecommunications linkSignal Processing0202 electrical engineering electronic engineering information engineeringResource allocationOnline algorithmResource allocationOptimization of detection threshold
researchProduct

The heterogeneity of inter-domain Internet application flows: entropic analysis and flow graph modelling

2013

The growing popularity of the Internet has triggered the proliferation of various applications, which possess diverse communication patterns and user behaviour. In this paper, the heterogeneous characteristics of Internet applications and traffic are investigated from a complex network and entropic perspective. On the basis of real-life flow data collected from a public network provided by an Internet service provider, flow graphs are constructed for five types of applications as follows: Web, P2P Download, P2P Stream, Video Stream and Instant Messaging. Three types of entropy measures are introduced to the flow graphs, and the heterogeneity of applications within a 24-h period is analysed …

Theoretical computer scienceComputer sciencebusiness.industryInter-domainTraffic identificationComplex networkcomputer.software_genreDegree distributionInternet service providerEntropy (information theory)Control flow graphThe InternetData miningElectrical and Electronic EngineeringbusinesscomputerTransactions on Emerging Telecommunications Technologies
researchProduct

Achieving Ultra Energy-efficient and Collision-free Data Collection in Wake-up Radio Enabled mIoT

2020

Data collectionbusiness.industryComputer scienceCollision freeWakeAerospace engineeringbusinessEfficient energy useICC 2020 - 2020 IEEE International Conference on Communications (ICC)
researchProduct

A measurement-based study on the correlations of inter-domain Internet application flows

2014

Internet traffic characterization has a profound impact on network engineering and traffic identification. Existing studies are often carried out on a per-flow basis, focusing on the properties of individual flows. In this paper, we study the interaction of Internet traffic flows and network features from a complex network perspective, focusing on six types of applications: P2P file sharing, P2P stream, HTTP, instant messaging, online games and abnormal traffic. With large-volume traffic flow records collected through proprietary line-speed hardware-based monitors, we construct flow graphs of these different application types. Based on the flow graphs, we calculate the correlation coefficie…

Computer Networks and Communicationsbusiness.industryInter-domainComputer scienceAssortativityNetwork engineeringInternet trafficComplex networkTraffic flowcomputer.software_genreFile sharingThe InternetData miningbusinesscomputerTraffic generation modelComputer networkComputer Networks
researchProduct

System times and channel availability analyses in multi-channel cognitive radio networks

2014

Channel accessibility by a secondary user (SU) in cognitive radio networks (CRNs) depends on the availability of the spectrum based on primary user and other SU activities. A new SU request may be blocked and an ongoing SU service may also be discarded if no sufficient spectrum is available. So far, little work has been done to analyze the reliability and availability aspects of CRNs from the perspective of the dependability theory. In this paper, we introduce the concept of availability for spectrum access in multi-channel CRNs, which is defined as the fraction of time that a CRN can allocate at least the minimum number of required channels for a new SU request. Through a proposed continuo…

Cognitive radiobusiness.industryComputer scienceReliability (computer networking)DependabilityFraction (mathematics)UnavailabilitybusinessMarkov modelComputer networkCommunication channel2014 IEEE International Conference on Communications (ICC)
researchProduct

An adaptive cooperative MAC mechanism in multi-hop wireless networks

2010

In this paper, we propose a novel adaptive cooperative MAC mechanism that is specifically designed for two-hop cooperative communications where source and destination cannot hear each other directly. The proposed scheme employs an efficient adaptive relay selection algorithm such that the number of relay nodes is optimized for each cooperative transmission to maximize cooperation benefits and effectively avoid potential collisions with other transmissions. In order to determine the optimal number of relays we apply a training sequence in Hello message exchange, which provides us with a channel status indicator combining both bit-level and flow-level information. Numerical results show that …

Computer scienceWireless networkbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSThroughputCooperative diversitylaw.inventionHop (networking)RelaylawComputer Science::Networking and Internet ArchitecturebusinessComputer Science::Information TheoryCommunication channelComputer networkThe IEEE symposium on Computers and Communications
researchProduct

Circuit-Elimination based Link-State Routing in Mobile Ad-hoc Networks

2007

Circuit-elimination based connected dominating set formation is an efficient technique for reducing routing overhead in mobile ad hoc networks. In this paper, we propose a new message dissemination algorithm which utilizes such techniques to reduce the number of nodes that generate or forward link state advertisements in link state routing protocols. Simulation results with both static and dynamic network topologies demonstrate the potential of the proposed algorithm to reduce routing overhead, compared with a benchmark link state routing protocol, OLSR.

Static routingZone Routing ProtocolDynamic Source Routingbusiness.industryComputer scienceDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWireless Routing ProtocolAd hoc wireless distribution serviceLink-state routing protocolOptimized Link State Routing ProtocolComputer Science::Networking and Internet ArchitectureDestination-Sequenced Distance Vector routingbusinessComputer network
researchProduct

System Times and Channel Availability for Secondary Transmissions in CRNs: A Dependability Theory based Analysis

2017

[EN] Reliability is of fundamental importance for the performance of secondary networks in cognitive radio networks (CRNs). To date, most studies have focused on predicting reliability parameters based on prior statistics of traffic patterns from user behavior. In this paper, we define a few reliability metrics for channel access in multichannel CRNs that are analogous to the concepts of reliability and availability in classical dependability theory. Continuous-time Markov chains are employed to model channel available and unavailable time intervals based on channel occupancy status. The impact on user access opportunities based on channel availability is investigated by analyzing the stead…

Reliability theoryComputer Networks and CommunicationsComputer scienceAerospace Engineering02 engineering and technologyCommunications system0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringDependabilityCognitive radio networks (CRNs)Resource managementElectrical and Electronic EngineeringSpectrum accessMarkov chainCumulative distribution functionGuaranteed availability020206 networking & telecommunications020302 automobile design & engineeringINGENIERIA TELEMATICAUniformization (probability theory)System timesReliability engineeringCognitive radioChannel availabilityAutomotive EngineeringContinuous-time Markov chains (CTMCs)UnavailabilityCommunication channel
researchProduct

Collision Avoidance in Wake-Up Radio Enabled WSNs: Protocol and Performance Evaluation

2018

In wake-up radio (WuR) enabled wireless sensor networks (WSNs), the envisaged application scenarios are primarily targeted at low traffic load conditions. When applying WuR to medium or heavy traffic load scenarios, however, collisions among wake-up calls (WuCs) may happen, resulting in a lower packet delivery ratio (PDR). In this paper, we propose a media access control protocol for WuR- enabled WSN that is capable of avoiding WuC collisions by activating a contention-based collision avoidance mechanism for WuC transmissions. The performance of the proposed protocol is evaluated by a Markov chain based mathematical model and is compared with a WuR protocol that performs only clear channel as…

Markov chainNetwork packetComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS010401 analytical chemistryMarkov process020206 networking & telecommunicationsThroughput02 engineering and technologyWake01 natural sciences0104 chemical sciencessymbols.namesake0202 electrical engineering electronic engineering information engineeringMedia access controlsymbolsbusinessWireless sensor networkProtocol (object-oriented programming)Collision avoidanceComputer network2018 IEEE International Conference on Communications (ICC)
researchProduct

Optimal Service Placement with QoS Monitoring in NFV and Slicing Enabled 5G IoT Networks

2021

Network function virtualization (NFV) and network slicing are two promising enabling technologies for 5G networks. Considering the volume of data traffic generated by Internet of things (IoT) applications and their service requirement diversity as well as that network resources are spread across different locations, it is imperative to find solutions for optimal service placement and resource allocation for quality of service (QoS) provisioning. In this paper, we address the challenges of optimal network service placement with active QoS monitoring in NFV and network slicing enabled 5G IoT networks and propose a network architecture with optimal computation and resource placement over core,…

VDP::Mathematics and natural science: 400::Information and communication science: 420
researchProduct

A cooperative lifetime extension MAC protocol in duty cycle enabled wireless sensor networks

2011

To reduce energy consumption in wireless sensor networks, the concept of duty cycle is used in many MAC protocols. Although these protocols provide efficient energy-conservation solutions, they cannot resolve the energy hole problem in a multi-hop network, where a few nodes near the sink must relay the packets from the rest of the network, and consequently exhaust their batteries earlier. The previously proposed REACT forwarding protocol triggers the cooperation of several nodes to extend transmission range and hop over the highly burdened node, thereby allowing it to save its energy and extend the lifetime of the network. However, the previous work lacked a MAC protocol with a duty cycle. …

EngineeringNetwork packetbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSRendezvousEnergy consumptionlaw.inventionHop (networking)Lifetime extensionRelaylawDuty cyclebusinessWireless sensor networkComputer network2011 - MILCOM 2011 Military Communications Conference
researchProduct

A novel traffic splitting policy for performance improvement in wireless mesh networks

2009

Wireless mesh networks are expected to play an important role in the next-generation wireless communication systems as it can provide wide coverage and scalable broadband Internet access services. However, as more traffic is injected into the network it may lead to throughput degradation, packet loss and longer transmission delay. In this paper, we argue that network performance can be improved by cross-layer design over multiple layers and load balancing based on service types. Correspondingly, a novel traffic splitting policy which can potentially utilize diverse paths for transmitting traffic flows of different service types from the same router has been proposed and investigated. Such a…

business.product_categoryTransmission delayWireless mesh networkComputer sciencebusiness.industryDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSInternet traffic engineeringLoad balancing (computing)Packet lossInternet accessNetwork performancebusinessTraffic generation modelComputer network2009 European Wireless Conference
researchProduct

Proportional and Preemption-Enabled Traffic Offloading for IP Flow Mobility: Algorithms and Performance Evaluation

2018

IP Flow Mobility (IFOM) enables a user equipment to offload data traffic at the IP flow level. Although the procedure of IFOM-based flow offloading has been specified by 3GPP, how many IP flows should be offloaded and when offloading should be performed are not defined. Consequently, IP flows may be routed to a target access network which has a strong signal strength but with backhaul congestion or insufficient access capability. In this paper, we propose two algorithms, referred to as proportional offloading (PO), and proportional and preemption-enabled offloading (PPO), respectively, for IP flow offloading in hybrid cellular and wireless local area networks. The PO algorithm decides an op…

Access networkComputer Networks and CommunicationsComputer sciencebusiness.industryIT service continuityComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPreemptionLocal area networkAerospace Engineering020206 networking & telecommunications020302 automobile design & engineering02 engineering and technologyBackhaul (telecommunications)0203 mechanical engineeringUser equipmentAutomotive Engineering0202 electrical engineering electronic engineering information engineeringWirelessElectrical and Electronic EngineeringbusinessMobility managementAlgorithmIEEE Transactions on Vehicular Technology
researchProduct

On the Performance of Channel Assembling and Fragmentation in Cognitive Radio Networks

2014

[EN] Flexible channel allocation may be applied to multi-channel cognitive radio networks (CRNs) through either channel assembling (CA) or channel fragmentation (CF). While CA allows one secondary user (SU) occupy multiple channels when primary users (PUs) are absent, CF provides finer granularity for channel occupancy by allocating a portion of one channel to an SU flow. In this paper, we investigate the impact of CF together with CA for SU flows by proposing a channel access strategy which activates both CF and CA and correspondingly evaluating its performance. In addition, we also consider a novel scenario where CA is enabled for PU flows. The performance evaluation is conducted based on…

Channel allocation schemesComputer sciencebusiness.industryApplied MathematicsFragmentation (computing)INGENIERIA TELEMATICATopologyUpper and lower boundsComputer Science ApplicationsContinuous time Markov chain modelingMulti-channel cognitive radio networksChannel assemblingCognitive radioFlow (mathematics)Channel fragmentationPerformance evaluationElectrical and Electronic EngineeringbusinessCommunication channelComputer networkIEEE Transactions on Wireless Communications
researchProduct

Combining Auto-Encoder with LSTM for WiFi-Based Fingerprint Positioning

2021

Although indoor positioning has long been investigated by various means, its accuracy remains concern. Several recent studies have applied machine learning algorithms to explore wireless fidelity (WiFi)-based positioning. In this paper, we propose a novel deep learning model which concatenates an auto-encoder with a long short term memory (LSTM) network for the purpose of WiFi fingerprint positioning. We first employ an auto-encoder to extract representative latent codes of fingerprints. Such an extraction is proven to be more reliable than simply using a deep neural network to extract representative features since a latent code can be reverted back to its original input. Then, a sequence o…

Artificial neural networkbusiness.industryComputer scienceDeep learningFeature extractionFingerprint (computing)WirelessPattern recognitionArtificial intelligenceFingerprint recognitionbusinessAutoencoderData modeling2021 International Conference on Computer Communications and Networks (ICCCN)
researchProduct

An optimized path-selection using airtime metric in OLSR networks: Implementation and testing

2008

Wireless mesh networks used for broadband access may be equipped with multiple Internet gateways. Using airtime metric as the main criterion for path selection is an effective method for achieving load-balancing in such a multi-homed mesh network. In this paper, we describe how the radio-aware path selection using airtime as a metric can be implemented in order to achieve this functionality, based on a modified version of an open source OLSR implementation. The paper presents both the principle of this method, its implementation and the empirical results which focus on testing the airtime metric functionality based on a deployed small-scale test network.

Routing protocolWireless mesh networkComputer sciencebusiness.industryDistributed computingMesh networkingLoad balancing (computing)Optimized Link State Routing ProtocolBroadbandComputer Science::Networking and Internet ArchitectureThe InternetbusinessInternetworkingComputer network2008 IEEE International Symposium on Wireless Communication Systems
researchProduct

A spatial role-based authorization framework for sensor network-assisted indoor WLANs

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/WIRELESSVITAE.2009.5172549 In this paper, we propose a spatial role-based authorization framework which specifies authorization based on both role and location constrains in a wireless local area network with assistance from a sensor network. The framework performs a location-restricted verificati…

business.industryComputer scienceData securityPermissionlaw.inventionResource (project management)lawServerVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Wi-FiMobile telephonybusinessWireless sensor networkFormal verificationComputer network2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology
researchProduct

Performance comparison of residual related algorithms for ToA positioning in wireless terrestrial and sensor networks

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE." Article also available from publisher: http://dx.doi.org/10.1109/WIRELESSVITAE.2009.5172462 Time of Arrival (ToA) is a popular technique for terrestrial positioning. This paper presents a comparison of ToA based residual related positioning algorithms in wireless terrestrial and sensor networks in both long range outdoor and short range indoor environments. Us…

Time of arrivalComputational complexity theoryComputer scienceIterative methodbusiness.industryVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552WirelessResidualCommunication complexitybusinessWireless sensor networkAlgorithmWeighting
researchProduct

Enabling Backoff for SCM Wake-Up Radio: Protocol and Modeling

2017

In sub-carrier modulation (SCM) wake-up radio (WuR) enabled wireless sensor networks, a node can initiate data transmission at any instant of time. In this letter, we propose to activate a backoff procedure before sending wake-up calls (WuCs) in order to avoid potential collisions among WuCs. Consequently, no backoff is needed for the main radio after a WuC is received. A discrete-time Markov chain model is developed to evaluate the performance. Numerical results on network throughput, energy efficiency, average delay, and collision probability reveal the benefits of enabling backoff for SCM-WuRs, especially under heavy traffic loads or saturated traffic conditions.

Exponential backoffMarkov chainbusiness.industryComputer scienceNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS010401 analytical chemistryReal-time computing020206 networking & telecommunicationsThroughput02 engineering and technology01 natural sciences0104 chemical sciencesComputer Science ApplicationsModulationModeling and Simulation0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringbusinessWireless sensor networkComputer networkEfficient energy useData transmissionIEEE Communications Letters
researchProduct

A Joint Time-Space Domain Analysis for Ultra-Reliable Communication in 5G Networks

2018

Reliable communication is a fundamental service level agreement criterion in wireless networks. Moreover, it is a performance indicator for ultra- reliable communication (URC) in emerging 5G networks. In URC, the quality of the delivered services to end-users ultimately depends on the availability of network resources as well as the quality of the received signal. Therefore, in order to analyze URC in cellular networks, both time- dependent spectrum availability and space-dependent service quality need to be considered. In this paper, we present a combined time and space domain analysis on network reliability based on a continuous time Markov chain model. To this end, we introduce a new rel…

Reliability theoryWireless networkbusiness.industryComputer scienceReliability (computer networking)Quality of service05 social sciencesMarkov process050801 communication & media studies020206 networking & telecommunications02 engineering and technologyBase stationService-level agreementsymbols.namesake0508 media and communicationsTelecommunications link0202 electrical engineering electronic engineering information engineeringCellular networksymbolsNetwork performancebusinessComputer networkCommunication channel2018 IEEE International Conference on Communications (ICC)
researchProduct

Greedy versus Dynamic Channel Aggregation Strategy in CRNs: Markov Models and Performance Evaluation

2011

Part 1: - PE-CRN 2011 Workshop; International audience; In cognitive radio networks, channel aggregation techniques which aggregate several channels together as one channel have been proposed in many MAC protocols. In this paper, we consider elastic data traffic and spectrum adaptation for channel aggregation, and propose two new strategies named as Greedy and Dynamic respectively. The performance of channel aggregation represented by these strategies is evaluated using continuous time Markov chain models. Moreover, simulation results based on various traffic distributions are utilized in order to evaluate the validity and preciseness of the mathematical models.

Mathematical optimizationMathematical modelComputer science020209 energycontinuous time Markov chain modelsAggregate (data warehouse)Cognitive radio networks020206 networking & telecommunications02 engineering and technologyMarkov modelchannel aggregation strategyperformance evaluationContinuous-time Markov chain[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Cognitive radio0202 electrical engineering electronic engineering information engineeringDynamic channel[INFO]Computer Science [cs]SimulationComputer Science::Information TheoryCommunication channel
researchProduct

Analysis on channel bonding/aggregation for multi-channel cognitive radio networks

2010

Channel bonding/aggregation techniques, which assemble several channels together as one channel, could be used in cognitive radio networks for the purpose of achieving better bandwidth utilization. In existing work on this topic, channel bonding/aggregation is focused on the cases when primary channels are time slotted or stationary as compared with secondary users' activities. In this paper, we analyze the performance of channel bonding/aggregation strategies when primary channels are not time slotted and the time scale of primary activities is at the same level as the secondary users', given that spectrum handover is not allowed. Continuous time Markov chain models are built in order to a…

business.industryComputer scienceMarkov processChannel bondingBlocking (statistics)Continuous-time Markov chainChannel capacitysymbols.namesakeCognitive radioHandoversymbolsbusinessComputer networkCommunication channel2010 European Wireless Conference (EW)
researchProduct

SCARKER: A sensor capture resistance and key refreshing scheme for mobile WSNs

2011

How to discover a captured node and to resist node capture attack is a challenging task in Wireless Sensor Networks (WSNs). In this paper, we propose a node capture resistance and key refreshing scheme for mobile WSNs which is based on the Chinese remainder theorem. The scheme is able of providing forward secrecy, backward secrecy and collusion resistance for diminishing the effects of capture attacks. By implementing our scheme on a Sun SPOT based sensor network testbed, we demonstrate that the time for updating a new group key varies from 56 ms to 546 ms and the energy consumption is limited to 16.5–225 mJ, depending on the length of secret keys and the number of sensors in a group.

business.industryComputer scienceNode (networking)TestbedMobile computingEnergy consumptionSun SPOTKey distribution in wireless sensor networksForward secrecyMobile telephonybusinessWireless sensor networkComputer networkGroup key2011 IEEE 36th Conference on Local Computer Networks
researchProduct

FoSBaS: A bi-directional secrecy and collusion resilience key management scheme for BANs

2012

Body Area Network (BAN) consists of various types of small physiological sensors, transmission modules and low computational components and can thus form an E-health solution for continuous all-day and any-place health monitoring. To protect confidentiality of collected data, a shared group key is usually deployed in a BAN, and consequently a secure communication group is generated. In this paper, we propose a bi-directional security and collusion resilience key management scheme for BAN, referred to as FoSBaS. Detailed analysis shows that the scheme can provide both forward security and backward security and resist against collusion attacks. Furthermore, the FoSBaS is implemented on a Sun …

business.industryComputer scienceNode (networking)TestbedCryptographyEnergy consumptionSun SPOTComputer securitycomputer.software_genreSecure communicationForward secrecyBody area networkSecrecyResilience (network)businessKey managementcomputerWireless sensor networkGroup keyComputer network2012 IEEE Wireless Communications and Networking Conference (WCNC)
researchProduct

Dependability-Based Reliability Analysis in URC Networks: Availability in the Space Domain

2019

Ultra-reliable low latency communication (URLLC), which refers to achieving almost 100% reliability at a certain (satisfactory) level of services and stringent latency, is one of the key requirements for 5G networks. However, most prior studies on reliable communication did not address space domain analysis. Neither were they pursued from a dependability perspective. This paper addresses the ultra-reliable communication (URC) aspect of URLLC and aims at advocating the concept of URC from a dependability perspective in the space domain. We perform in-depth analysis on URC considering both the spatial characteristics of cell deployment and user distributions, as well as service requirements. …

Reliability theoryComputer Networks and CommunicationsAddress spaceComputer scienceQuality of serviceDistributed computing020206 networking & telecommunications02 engineering and technologyUser requirements documentNetwork topologyComputer Science ApplicationsSoftware deployment0202 electrical engineering electronic engineering information engineeringCellular networkDependabilityDomain analysisElectrical and Electronic EngineeringSoftwareIEEE/ACM Transactions on Networking
researchProduct

Analysis of mobile-oriented energy consumption for heterogeneous connections in hybrid wireless networks

2012

While more and more mobile devices are equipped with both cellular and WLAN interfaces for internet access, the energy consumption aspect of these connections has not been studied in depth in the literature. In this paper, a hybrid network with three alternative wireless connections, namely, a cellular component, a combined component with a mixed ad hoc and cellular link, or an infrastructure-based WLAN component, is investigated. A distance-based analysis on the energy consumption of a mobile station has been performed for each alternative wireless connection, and corresponding numerical results have been obtained. The results suggest that, to increase link throughput while maintaining min…

Vehicular ad hoc networkComputer Networks and CommunicationsComputer sciencebusiness.industryWireless networkComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWireless WANBase transceiver stationEnergy consumptionMobile ad hoc networkStationMobile stationbusinessComputer networkInternational Journal of Communication Networks and Distributed Systems
researchProduct

Channel Assembling with Priority-Based Queues in Cognitive Radio Networks: Strategies and Performance Evaluation

2014

[EN] With the implementation of channel assembling (CA) techniques, higher data rate can be achieved for secondary users in multi-channel cognitive radio networks. Recent studies which are based on loss systems show that maximal capacity can be achieved using dynamic CA strategies. However the channel allocation schemes suffer from high blocking and forced termination when primary users become active. In this paper, we propose to introduce queues for secondary users so that those flows that would otherwise be blocked or forcibly terminated could be buffered and possibly served later. More specifically, in a multi-channel network with heterogeneous traffic, two queues are separately allocate…

CTMCQueueing theoryChannel allocation schemesbusiness.industryComputer scienceApplied MathematicsCognitive radio networksMarkov processINGENIERIA TELEMATICABlocking (statistics)Computer Science ApplicationsScheduling (computing)Continuous-time Markov chainChannel assemblingsymbols.namesakeCognitive radioHeterogeneous trafficsymbolsQueuing schemesElectrical and Electronic EngineeringbusinessQueueCommunication channelComputer networkIEEE Transactions on Wireless Communications
researchProduct

Capacity Upper Bound of Channel Assembling in Cognitive Radio Networks with Quasistationary Primary User Activities

2013

In cognitive radio networks (CRNs) with multiple channels, various channel-assembling (ChA) strategies may be applied to secondary users (SUs), resulting in different achieved capacity. However, there is no previous work on determining the capacity upper bound (UB) of ChA for SUs under given system configurations. In this paper, we derive the maximum capacity for CRNs with ChA through Markov chain modeling, considering that primary user (PU) activities are relatively static, compared with SU services. We first deduce a closed-form expression for the maximum capacity in a dynamic ChA strategy and then demonstrate that no other ChA strategy can provide higher capacity than that achieved by th…

EngineeringMathematical optimizationMarkov chainComputer Networks and Communicationsbusiness.industryAerospace EngineeringINGENIERIA TELEMATICAUpper and lower boundsExpression (mathematics)Continuous-time Markov chain (CTMC) modelsCognitive radioChannel assembling (ChA)Automotive EngineeringQuasistationary regime (QSR)Cognitive radio networks (CRNs)Electrical and Electronic EngineeringbusinessSimulationCommunication channel
researchProduct

Power consumption analysis for mobile stations in hybrid relay-assisted wireless networks

2010

While Internet access using mobile or wireless technologies has become ubiquitous these days, the energy consumption aspect of such connections has not been studied in-depth yet. In this paper, a hybrid wireless network, which consists of a cellular component and a relay-assisted ad hoc component, is studied focusing on energy consumption by mobile stations with respect to the amount of data communicated and achieved battery lifetime. Four alternative paths are considered, including both pure cellular and hybrid ad hoc/cellular links for uplink and downlink traffic. The effects of each alternative connection on energy consumption of the involved mobile stations are analyzed in terms of the …

Wireless networkbusiness.industryComputer scienceWireless ad hoc networkMobile stationComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMobile computingCellular networkMobile ad hoc networkEnergy consumptionMobile telephonybusinessComputer networkIEEE 5th International Symposium on Wireless Pervasive Computing 2010
researchProduct

An enhanced TCP congestion avoidance scheme and its performance evaluation in high speed satellite networks

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE." Article also available from publisher: http://dx.doi.org/10.1109/ICICS.2009.5397691 High speed satellite communication networks are emerging as part of the future global wireless communication systems. However, existing transmission control protocols for satellite networks do not provide satisfactory performance over high speed satellite links due to their ine…

business.industryComputer scienceTransmission Control ProtocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingTCP tuningScalable TCPVDP::Technology: 500::Information and communication technology: 550ThroughputH-TCPNetwork congestionComputer Science::Networking and Internet ArchitectureCommunications satellitebusinessBIC TCPComputer network2009 7th International Conference on Information, Communications and Signal Processing (ICICS)
researchProduct

Cooperative RTS/CTS MAC with relay selection in distributed wireless networks

2009

This paper proposes a cooperative multiple access protocol based on the Distributed Coordination Function (DCF) Request-To-Send/Clear-To-Send (RTS/CTS) scheme for distributed wireless networks. It answers three key questions concerning cooperation from the network perspective, namely when to cooperate, whom to cooperate with and how to protect cooperative transmissions. According to our protocol, the cooperation is initiated only if the direct transmission fails. An optimal relay node is selected in a distributed manner according to instantaneous relay channel conditions without prior information or extra signaling among relay candidates in the network. An additional three-way handshake is …

Hidden node problemComputer sciencebusiness.industryWireless networkNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSDistributed coordination functionlaw.inventionCooperative diversityRelaylawMultiple Access with Collision Avoidance for WirelessbusinessRelay channelComputer network2009 International Conference on Ultra Modern Telecommunications & Workshops
researchProduct

An automatic cooperative retransmission MAC protocol in Wireless Local Area Networks

2009

Existing solutions for cooperation in wireless networks either require simultaneous transmission of source and relay nodes or impose major modifications to original MAC protocols. In this paper, a new efficient retransmission MAC protocol is proposed for IEEE 802.11 based cooperation communications, with minimum modifications to the DCF scheme. Throughput and access delay performance of the proposed protocols is analyzed in error-prone and highly temporally correlated channels. Numerical results show that significant benefits can be achieved with our cooperative protocol, compared with the legacy schemes.

Wireless networkComputer sciencebusiness.industryRetransmissionDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSLocal area networkThroughputlaw.inventionIEEE 802.11Transmission (telecommunications)RelaylawWirelessbusinessComputer network2009 European Wireless Conference
researchProduct

Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs

2013

Unattended Wireless Sensor Networks (UWSNs), characterized by the absence of real-time communication between sensors and sinks, impose sensors to retain data till the next visit of a mobile sink to off-load their data. In such networks, if a sensor is compromised, data accumulated in the sensor are exposed to attackers. In addition, by holding the secret key of the compromised sensor, attackers can also learn post-compromise data accumulated by the sensor. Furthermore, once sensors stop working due to, for instance, node crash or battery depletion, all the accumulated data will be lost. In this paper, we propose a secure and reliable data distribution scheme that addresses these challenges.…

Key distribution in wireless sensor networksComputer Networks and CommunicationsForward secrecybusiness.industryComputer scienceNode (networking)Distributed data storeProbabilistic logicKey (cryptography)businessWireless sensor networkComputer networkComputer Communications
researchProduct