Search results for "ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS"
showing 10 items of 449 documents
Coloring-based resource allocations in ad-hoc wireless networks
2011
It is well known that CSMA/CA protocols exhibit very poor performance in case of multi-hop transmissions, because of inter-link interference due to imperfect carrier sensing. We propose to control such an interference by preallocating temporal slots in which different sets of network nodes are allowed to contend for the channel access. The approach is based on distributed coloring algorithms with limited signaling overhead that can be customized as a function of the network topology and traffic load.
A Novel Recruitment Policy to Defend against Sybils in Vehicular Crowdsourcing
2021
Vehicular Social Networks (VSNs) is an emerging communication paradigm, derived by merging the concepts of Online Social Networks (OSNs) and Vehicular Ad-hoc Networks (VANETs). Due to the lack of robust authentication mechanisms, social-based vehicular applications are vulnerable to numerous attacks including the generation of sybil entities in the networks. We address this important issue in vehicular crowdsourcing campaigns where sybils are usually employed to increase their influence and worsen the functioning of the system. In particular, we propose a novel User Recruitment Policy (URP) that, after extracting the participants within the event radius of a crowdsourcing campaign, detects …
Achieving Robustness through Caching and Retransmissions in IEEE 802.15.4-based WSNs
2007
This paper proposes a network-layer protocol for wireless sensor networks based on the IEEE 802.15.4 standard. Our protocol is devised to provide reliable data gathering in latency-constrained applications, and exploits both the flexibility of the IEEE 802.15.4 MAC layer and features of data aggregation techniques, such as implicit acknowledgment of reception. The proposed protocol acts as a routing module and a control entity for the MAC layer and provides reliable communication, while managing power saving and synchronizertion among nodes. Without relying on MAC-layer acknowledgments, the protocol implements caching and network-layer retransmissions, triggered upon detection of a link fai…
Incoherent dispersive shocks in the spectral evolution of random waves
2013
We predict theoretically and numerically the existence of incoherent dispersive shock waves. They manifest themselves as an unstable singular behavior of the spectrum of incoherent waves that evolve in a noninstantaneous nonlinear environment. This phenomenon of "spectral wave breaking" develops in the weakly nonlinear regime of the random wave. We elaborate a general theoretical formulation of these incoherent objects on the basis of a weakly nonlinear statistical approach: a family of singular integro-differential kinetic equations is derived, which provides a detailed deterministic description of the incoherent dispersive shock wave phenomenon.
On the Fidelity of IEEE 802.11 commercial cards
2006
The IEEE 802.11 D CF protocol is known to be fair in terms of long-term resource repartition among the contending stations. However, when considering real scenarios, where commercial 802.11 cards interact, very unpredictable as well as sometimes surprising behaviors emerge. Motivation of this paper is to investigate the reasons of the very evident disagreement between the theoretical IEEE 802.11 DCF protocol models and its practical implementations. Inparticular, we try to characterize the card behavior not only in terms of perceived throughput, but also in terms of low-level channel access operations. In fact, the simple throughput analysis does not allow to identify what affecting paramet…
Bluetooth-3G wireless transmission system for neural signal telemetry
2007
In this contribution a wireless transmission system for neural signals is developed. This system includes data compression algorithms at the information source, namely neural signals recorded by micro-electrode arrays. The signals are transmitted over Bluetooth to a mobile device that, without any processing or storing, retransmits it over 3G to a remote server where signal post-processing and analysis is performed. The overall transmission rate of the system is limited by the Bluetooth link between the information source and the mobile phone, as well as by the limited processing capabilities of the mobile device and also by the 3G-link. Data compression allows the transmission of up to 7 n…
Interference excision algorithm for frequency hopping spread spectrum based on undecimated wavelet packet transform
2002
An algorithm for reducing narrowband interference effects in frequency hopping spread spectrum is presented. The method is based on the undecimated wavelet packet transform. It improves the performance obtained by other methods. Experimental results demonstrate the suitability of the algorithm.
VLPZ: The Vehicular Location Privacy Zone
2016
International audience; One of the key challenges in the success of vehicular ad hoc networks (VANETs) is to consider the location privacy of drivers. Although, the pseudonym changing approach is suggested by standardization development organizations such as IEEE and ETSI, the development of an effective pseudonym changing strategy is still an open issue. The existing pseudonym changing strategies are either not effective to protect against the pseudonyms linking attacks or can have a negative impact on the VANETs’ applications. To address these issues, this paper proposes a new pseudonym changing strategy based on the Vehicular Location Privacy Zone (VLPZ), which is a roadside infrastructu…
A service-oriented routing scheme with load balancing in wireless mesh networks
2008
Wireless mesh networks will play an important role in the next-generation wireless communication systems as it can provide wide coverage and scalable broadband Internet access services. However, congestion in such networks may lead to throughput degradation, packet loss and longer transmission delay. Therefore, routing and traffic forwarding schemes which are aware of the congestion status of a wireless network can efficiently improve network performance. In this paper, we propose a new congestion-aware routing scheme which may direct different paths for different services types, according to network congestion status. The goal of this routing scheme is to use traffic load metric for choosi…
Circuit-Elimination based Link-State Routing in Mobile Ad-hoc Networks
2007
Circuit-elimination based connected dominating set formation is an efficient technique for reducing routing overhead in mobile ad hoc networks. In this paper, we propose a new message dissemination algorithm which utilizes such techniques to reduce the number of nodes that generate or forward link state advertisements in link state routing protocols. Simulation results with both static and dynamic network topologies demonstrate the potential of the proposed algorithm to reduce routing overhead, compared with a benchmark link state routing protocol, OLSR.