Search results for "packet drop"

showing 5 items of 5 documents

Efficient Hybrid Emergency Aware MAC Protocol for Wireless Body Sensor Networks

2018

International audience; In Body Sensor Networks (BSNs), two types of events should be addressed: periodic and emergency events. Traffic rate is usually low during periodic observation, and becomes very high upon emergency. One of the main and challenging requirements of BSNs is to design Medium Access Control (MAC) protocols that guarantee immediate and reliable transmission of data in emergency situations, while maintaining high energy efficiency in non-emergency conditions. In this paper, we propose a new emergency aware hybrid DTDMA/DS-CDMA protocol that can accommodate BSN traffic variations by addressing emergency and periodic traffic requirements. It takes advantage of the high delay …

Computer sciencedelayAccess control02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]DTDMAlcsh:Chemical technology01 natural sciencesBiochemistryArticleAnalytical Chemistry[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingBSN[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]energy consumption0202 electrical engineering electronic engineering information engineeringWirelesslcsh:TP1-1185Electrical and Electronic EngineeringInstrumentationMACbusiness.industryNetwork packet010401 analytical chemistryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsEnergy consumption[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationAtomic and Molecular Physics and Optics0104 chemical sciences[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]packet drop[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkEfficient energy useComputer networkDS-CDMAOPNETSensors
researchProduct

Robust H∞ filtering for networked control systems with markovian jumps and packet dropouts

2014

Published version of an article in the journal: Modeling, Identification and Control. Also available from the publisher at: http://dx.doi.org/10.4173/mic.2014.3.3 Open Access This paper deals with the H∞ filtering problem for uncertain networked control systems. In the study, network-induced delays, limited communication capacity due to signal quantization and packet dropout are all taken into consideration. The finite distributed delays with probability of occurrence in a random way is introduced in the network.The packet dropout is described by a Bernoulli process. The system is modeled as Markovian jumps system with partially known transition probabilities. A full-order filter is designe…

H∞ filterNetwork packetComputer scienceMarkov processComputer Science Applications1707 Computer Vision and Pattern RecognitionNetworked control systemMarkov jump systemH-Infinity filterH filterVDP::Mathematics and natural science: 400::Mathematics: 410::Analysis: 411lcsh:QA75.5-76.95Computer Science Applicationssymbols.namesakeIdentification (information)Markovian jumpControl and Systems EngineeringControl theorypacket dropoutsH∞ filter; Markov jump system; Networked control system; Packet dropouts; Control and Systems Engineering; Software; Modeling and Simulation; Computer Science Applications1707 Computer Vision and Pattern RecognitionModeling and SimulationControl systemsymbolslcsh:Electronic computers. Computer sciencenetworked control systemSoftware
researchProduct

An intrusion detection system for selective forwarding attack in IPv6-based mobile WSNs

2017

Selective forwarding attack is considered among the most dangerous attack in wireless sensor networks, particularly in mobile environment. The attackers compromise legitimate nodes and selectively drop some packets. In addition to that, the movement of some nodes increases link failures, collisions and packet loss. So, it will be more difficult to detect malicious nodes from legitimates ones. This paper focuses on detecting selective forwarding attackers in IPv6-based mobile wireless sensor networks when the standardized IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) is used. Contrarily to previous works which propose solutions to detect selective forwarding attack in static w…

Routing protocolComputer scienceNetwork packetbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS010401 analytical chemistryPacket forwarding020206 networking & telecommunications02 engineering and technologyIntrusion detection system01 natural sciences0104 chemical sciencesIPv6Key distribution in wireless sensor networksPacket lossPacket drop attack0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkComputer network2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)
researchProduct

Observer-Based Stabilization of Stochastic Systems with Limited Communication

2012

Published version of an article in the journal: Mathematical Problems in Engineering. Also available from Hindawi: http://dx.doi.org/10.1155/2012/781542 Open Access This paper studies the problem of observer-based stabilization of stochastic nonlinear systems with limited communication. A communication channel exists between the output of the plant and the input of the dynamic controller, which is considered network-induced delays, data packet dropouts, and measurement quantization. A new stability criterion is derived for the stochastic nonlinear system by using the Lyapunov functional approach. Based on this, the design procedure of observer-based controller is presented,which ensures asy…

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413Mathematical optimizationObserver (quantum physics)Article SubjectComputer scienceStability criterionGeneral Mathematicslimited communicationSeparation principleExponential stabilityControl theorydesign proceduredynamic controllerNetwork packetlcsh:MathematicsQuantization (signal processing)VDP::Technology: 500::Mechanical engineering: 570General EngineeringIllustrative examplesObserver (special relativity)lcsh:QA1-939Lyapunov functionalsdesign techniqueNonlinear systemlcsh:TA1-2040data packet dropoutlcsh:Engineering (General). Civil engineering (General)Mathematical Problems in Engineering
researchProduct

Securing AODV routing protocol against black hole attack in MANET using outlier detection scheme

2017

Imposing security in MANET is very challenging and hot topic of research science last two decades because of its wide applicability in applications like defense. Number of efforts has been made in this direction. But available security algorithms, methods, models and framework may not completely solve this problem. Motivated from various existing security methods and outlier detection, in this paper novel simple but efficient outlier detection scheme based security algorithm is proposed to protect the Ad hoc on demand distance vector (AODV) reactive routing protocol from Black hole attack in mobile ad hoc environment. Simulation results obtained from network simulator tool evident the simpl…

Routing protocolDistance-vector routing protocolRobustness (computer science)business.industryPacket drop attackAd hoc On-Demand Distance Vector RoutingComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSAnomaly detectionMobile ad hoc networkbusinessComputer networkNetwork simulation2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON)
researchProduct