The search functionality is under construction.

Keyword Search Result

[Keyword] wireless ad hoc(20hit)

1-20hit
  • Improving Fairness in Wireless Ad Hoc Networks by Channel Access Sensing at Link Layer and Packet Rate Control

    Nguyen Minh TUAN  Kohei WATABE  Pham Thanh GIANG  Kenji NAKAGAWA  

     
    PAPER-Network

      Pubricized:
    2017/04/14
      Vol:
    E100-B No:10
      Page(s):
    1818-1826

    Wireless Ad hoc networks have been rapidly developed in recent years since they promise a wide range of applications. However, their structures, which are based on the IEEE 802.11 standard, cause a severe unfairness problem in bandwidth sharing among different users. This is an extreme drawback because in wireless ad hoc networks, all users need to be treated fairly regardless of their geographical positions. In this paper, we propose a method to improve the fairness among flows by sensing channel access of other nodes based on the information obtained at the link layer and then, controlling the packet sending rate from the link layer to the MAC layer and the dequeue rate from the queue. Simulation results show that the proposed method achieves a better fairness with a good total throughput compared to conventional methods.

  • Multipath Routing Handoff for Mobile Wireless Ad Hoc Network Infrastructure

    KyengHeum NA  DaeHee KIM  SunShin AN  

     
    PAPER-Communication Theory and Signals

      Vol:
    E100-A No:6
      Page(s):
    1315-1324

    In this paper, MWAN (Mobile Wireless Ad hoc Networks with internet connection) is considered, which is a solution for many tasks owing to its ease of use, and practicality. Recently, MWAN is required to support large data like multimedia data transfer and it is transferred through several relay nodes. There are 2 problems that cause difficulties for large data transfer through a mobile network. First one is rerouting delay by handoff and second one is network congestion caused by handoff. Also, faulty data transfer caused by handoff delay makes extra load and causes some problems for MWAN. To solve these problems and get network reliability, we propose a new multipath routing scheme that can provide solution for seamless connection while handoff. In the proposed scheme, our MWAN can support multiple paths for data transfer, maintain end-to-end connection while handoff and get new route quickly. The performance of the proposed scheme is evaluated and compared with other multipath routing scheme to show the improvement.

  • Survivability Analysis for a Wireless Ad Hoc Network Based on Semi-Markov Model

    Zhipeng YI  Tadashi DOHI  

     
    PAPER-Network and Communication

      Vol:
    E95-D No:12
      Page(s):
    2844-2851

    Network survivability is defined as the ability of a network keeping connected under failures and/or attacks. In this paper, we propose two stochastic models; binomial model and negative binomial model, to quantify the network survivability and compare them with the existing Poisson model. We give mathematical formulae of approximate network survivability for respective models and use them to carry out the sensitivity analysis on model parameters. Throughout numerical examples it is shown that the network survivability can change drastically when the number of network nodes is relatively small under a severe attack mode which is called the Black hole attack.

  • A Cross-Layer Design for Wireless Ad-Hoc Peer-to-Peer Live Multimedia Streaming

    Chen-Hua SHIH  Jun-Li KUO  Yaw-Chung CHEN  

     
    LETTER-Network

      Vol:
    E95-B No:10
      Page(s):
    3316-3319

    Establishing peer-to-peer (P2P) live streaming for mobile ad hoc network (MANET) requires an efficient scheme to deliver the real-time data in the infrastructure-less disaster environment. However, P2P membership management is difficult in the dynamic mobility and resource limited MANET. In this paper, we present a cross-layer design for P2P-MANET which integrates P2P DHT-based routing protocol and IPv6 routing protocol. Therefore, the proposed scheme can manage and recover the P2P overlay as well as selecting efficient routing path to multicast video streaming. The simulation results demonstrate that the proposed scheme performs relatively better than the layered approach or the off-the-shelf design in terms of the playback continuity and signaling overhead.

  • RING: A Cross-Layer P2P Group Conferencing Mechanism over Mobile Ad-Hoc Networks

    Jun-Li KUO  Chen-Hua SHIH  Cheng-Yuan HO  Ming-Ching WANG  Yaw-Chung CHEN  

     
    PAPER

      Vol:
    E95-B No:9
      Page(s):
    2759-2768

    In the infrastructure-less disaster environment, the application of the peer-to-peer (P2P) group conference over mobile ad hoc network (MANET) can be used to communicate with each other when the rescue crews search the survivors but work separately. However, there still are several problems of in-time multimedia delivery in P2P-MANET: (1) MANET mobility influences the maintenance of P2P overlay. (2) P2P overlay is not proximal to MANET topology, this leads to the inefficient streaming delivery. (3) The unreliable wireless connection leads to the difficulty of multi-source P2P group conferencing. Therefore, P2P conferencing cannot work well on MANET. To overcome the above disadvantages, in this paper, we present a cross-layer P2P group conferencing mechanism over MANET, called RING (Real-time Intercommunication Network Gossip). The RING uses the ring overlay to manage peers and utilizes the cross-layer mechanism to force the ring overlay to be proximal to MANET topology. Therefore, RING can lead efficient in-time multimedia streaming delivery. On the other hand, the ring overlay can deal with peer joining/leaving fast and simply, and improves the delivery efficiency with the minimum signaling overhead. Through mathematical theory and a series of experiments, we demonstrate that RING is workable and it can shorten the source-to-end delay with minimal signaling overhead.

  • Security Condition for Exact Localization in Wireless Ad Hoc Networks

    Jin Seok KIM  Dae Hyun YUM  Sung Je HONG  Jong KIM  Pil Joong LEE  

     
    LETTER-Network

      Vol:
    E95-B No:7
      Page(s):
    2459-2462

    As deployment of wireless ad hoc networks for location-based services increases, accurate localization of mobile nodes is becoming more important. Localization of a mobile node is achieved by estimating its distances from a group of anchor nodes. If some anchors are malicious and colluding, localization accuracy cannot be guaranteed. In this article, we present the security conditions for exact localization in the presence of colluding malicious anchors. We first derive the minimum number of truthful anchors that are required for exact localization in 2-D Euclidean space where some anchors may be collinear. Second, we extend our security condition to 3-D localization where some anchors may be coplanar.

  • Uncertainty Mitigation for Trustworthiness-Oriented Applications in Wireless Ad Hoc Networks Open Access

    Feng LI  Jie WU  Avinash SRINIVASAN  

     
    INVITED PAPER

      Vol:
    E95-D No:1
      Page(s):
    12-19

    Link and node trustworthiness are important metrics in wireless ad hoc networks. Many existing wireless ad hoc network routing algorithms assume the availability of precise trustworthiness information. This, however, is an unrealistic assumption given the dynamics of wireless ad hoc networks. Therefore, a realistic method is needed to evaluate trustworthiness by mitigating uncertainty in the estimation process. In this paper, we propose a novel trustworthiness estimation model that accounts for uncertainty as well as two uncertainty mitigation schemes. We then illustrate the effectiveness of our schemes using a utility-oriented routing algorithm as a sample application. An extensive simulation study shows that these two uncertainty mitigation schemes significantly increase path stability and the long-term total benefit of the wireless ad hoc network.

  • Expanding Ring-Based Data Query with Delay Constraints for Dense Wireless Ad Hoc Networks

    Yuebin BAI  Jun HUANG  

     
    PAPER-Network

      Vol:
    E93-B No:11
      Page(s):
    3023-3034

    Data query is one of the most important issues in wireless ad hoc networks, since the ultimate goal of these networks is to support efficient data sharing among wireless nodes. In this paper, we study the issue of data query for delay-sensitive applications in dense wireless ad hoc networks. We focus our attention on step-by-step expanding ring-based data query, which provides an upper bound on query delay to any expanding ring based query strategies. Two replication strategies including Index Replication (IR) and Data Replication (DR) are considered, to improve the delay performance of data query. We analyze the probabilistic behavior of query delay for both DR and IR by theoretical methods, and develop analytical models to approximate the minimum number of replicas required for both query strategies if an application-specified delay bound is imposed. Our work is validated through extensive simulations.

  • Mobility-Based Topology Control for Wireless Ad Hoc Networks

    Jae-Young SEOL  Seong-Lyun KIM  

     
    PAPER-Network

      Vol:
    E93-B No:6
      Page(s):
    1443-1450

    The mobility control of mobile nodes can be an alternative to the transmitting power adjustment in case that fixed transmitting power is just used in the topology control. Assuming the controllable mobility of nodes, we propose four distributed mobility control algorithms assuring the network connectivity and the capacity improvement. We compare the throughput of each algorithm with the widely accepted capacity scale law considering the energy consumption. The proposed mobility-based topology control algorithms are named according to its operational characteristics; RP (Rendezvous Point), NNT (Nearest Neighbor Tracking), DM (Diffusion Model), and GP (Grid Packing). Through extensive simulations, we show that all the proposed algorithms successfully change a partitioned random network topology into a connected network topology without the power control. Furthermore, the topology reconfigured by the mobility control has the improved network capacity beyond that of the initial network. In the newly defined performance metric, effective capacity, the simulation results show that GP provides more improved and stable performance over various node densities with the short completion time.

  • Secure and Reliable Broadcasting Based on Cooperative Diversity in Wireless Ad Hoc Networks

    Taejoon PARK  

     
    LETTER-Network

      Vol:
    E91-B No:10
      Page(s):
    3338-3341

    In wireless ad hoc networks, providing an authentication service to verify that the broadcast packet is from the claimed sender without modification, is challenging due mainly to the inherently lossy wireless links. This paper presents a novel Secure and Reliable Broadcasting that reinforces the broadcast authentication with reliability and energy-efficiency capabilities by using the cooperative diversity to superimpose two distinct signals. The proposed protocol achieves significant savings of transmission power and fair assurance of reliability among receivers.

  • Application-Level and User-Level QoS Assessment of Audio-Video IP Transmission over Cross-Layer Designed Wireless Ad Hoc Networks

    Toshiro NUNOME  Shuji TASAKA  Ken NAKAOKA  

     
    PAPER-Network

      Vol:
    E91-B No:10
      Page(s):
    3205-3215

    This paper performs application-level QoS and user-level QoS assessment of audio-video streaming in cross-layer designed wireless ad hoc networks. In order to achieve high QoS at the user-level, we employ link quality-based routing in the network layer and media synchronization control in the application layer. We adopt three link quality-based routing protocols: OLSR-SS (Signal Strength), AODV-SS, and LQHR (Link Quality-Based Hybrid Routing). OLSR-SS is a proactive routing protocol, while AODV-SS is a reactive one. LQHR is a hybrid protocol, which is a combination of proactive and reactive routing protocols. For application-level QoS assessment, we performed computer simulation with ns-2 where an IEEE 802.11b mesh topology network with 24 nodes was assumed. We also assessed user-level QoS by a subjective experiment with 30 assessors. From the assessment results, we find AODV-SS the best for networks with long inter-node distances, while LQHR outperforms AODV-SS for short inter-node distances. In addition, we also examine characteristics of the three schemes with respect to the application-level QoS in random topology networks.

  • Broadcasting with Randomized Network Coding in Dense Wireless Ad Hoc Networks

    Takahiro MATSUDA  Taku NOGUCHI  Tetsuya TAKINE  

     
    PAPER-Network

      Vol:
    E91-B No:10
      Page(s):
    3216-3225

    In this paper, we consider the broadcast storm problem in dense wireless ad hoc networks where interference among densely populated wireless nodes causes significant packet loss. To resolve the problem, we apply randomized network coding (RNC) to the networks. RNC is a completely different approach from existing techniques to resolve the problem, and it reduces the number of outstanding packets in the networks by encoding several packets into a single packet. RNC is a kind of linear network coding, and it is suited to wireless ad hoc networks because it can be implemented in a completely distributed manner. We describe a procedure for implementing the wireless ad hoc broadcasting with RNC. Further, with several simulation scenarios, we provide some insights on the relationship between the system parameters and performance and find that there is the optimal length of coding vectors for RNC in terms of packet loss probability. We also show a guideline for the parameter setting to resolve the broadcast storm problem successfully.

  • Forward Interference Avoidance in Ad Hoc Communications Using Adaptive Array Antennas

    Tomofumi SAKAGUCHI  Yukihiro KAMIYA  Takeo FUJII  Yasuo SUZUKI  

     
    PAPER-Terrestrial Radio Communications

      Vol:
    E91-B No:9
      Page(s):
    2940-2947

    Wireless ad hoc communications such as ad hoc networks have been attracting researchers' attention. They are expected to become a key technology for "ubiquitous" networking because of the ability to configure wireless links by nodes autonomously, without any centralized control facilities. Adaptive array antennas (AAA) have been expected to improve the network efficiency by taking advantage of its adaptive beamforming capability. However, it should be noted that AAA is not almighty. Its interference cancellation capability is limited by the degree-of-freedom (DOF) and the angular resolution as a function of the number of element antennas. Application of AAA without attending to these problems can degrade the efficiency of the network. Let us consider wireless ad hoc communication as a target application for AAA, taking advantage of AAA's interference cancellation capability. The low DOF and insufficient resolution will be crucial problems compared to other wireless systems, since there is no centralized facility to control the nodes to avoid interferences in such systems. A number of interferences might impinge on a node from any direction of arrival (DOA) without any timing control. In this paper, focusing on such limitations of AAA applied in ad hoc communications, we propose a new scheme, Forward Interference Avoidance (FIA), using AAA for ad hoc communications in order to avoid problems caused by the limitation of the AAA capability. It enables nodes to avoid interfering with other nodes so that it increases the number of co-existent wireless links. The performance improvement of ad hoc communications in terms of the number of co-existent links is investigated through computer simulations.

  • CP-TDMA: Coloring- and Probability-Based TDMA Scheduling for Wireless Ad Hoc Networks

    Xuedan ZHANG  Jun HONG  Lin ZHANG  Xiuming SHAN  Victor O. K. LI  

     
    LETTER-Network

      Vol:
    E91-B No:1
      Page(s):
    322-326

    This paper addresses the issue of transmission scheduling in wireless ad hoc networks. We propose a Time Division Multiple Access (TDMA) scheduling scheme based on edge coloring and probabilistic assignment, called CP-TDMA. We categorize the conflicts suffered by wireless links into two types: explicit conflicts and implicit conflicts, and utilize two different strategies to deal with them. Explicit conflicts are avoided completely by a simple distributed edge-coloring algorithm µ-M, and implicit conflicts are minimized by applying probabilistic time slot assignments to links. We evaluate CP-TDMA analytically and numerically, and find that CP-TDMA, which requires only local information exhibits a better performance than previous work.

  • An Audio-Video Multipath Streaming Scheme with Media Synchronization Control: Application-Level QoS Assessment in a Wireless Ad Hoc Network

    Toshiro NUNOME  Shuji TASAKA  

     
    PAPER

      Vol:
    E88-B No:9
      Page(s):
    3623-3634

    This paper proposes the MultiPath streaming scheme with Media Synchronization control (MPMS) for audio-video transmission in wireless ad hoc networks. In many audio-video streaming applications, media compensate each other from a perceptual point of view. On the basis of this property, we treat the two streams as separate transport streams, and then the source transmits them into two different routes if multiple routes to the destination are available. The multipath transmission disturbs the temporal structure of the streams; in MPMS, the disturbance is remedied by media synchronization control. In order to implement MPMS in this paper, we enhance the existing Dynamic Source Routing (DSR) protocol. We compare the application-level QoS of MPMS and three other schemes for audio-video transmission by simulation with ns-2. In the simulation, we also assess the influence of the multipath transmission on other traffic. The simulation result shows that MPMS is effective in achieving high QoS at the application-level.

  • Collision Avoidance and Recovery for Multicast Communications in Ad Hoc Networks

    Kwan Shek LAU  Derek C.W. PAO  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E88-B No:7
      Page(s):
    2937-2943

    The basic carrier sense multi-access control scheme for multicast communications in wireless ad hoc networks suffers from the well know hidden terminal problem. The data packet collision probability is relatively high, and the packet delivery ratio is sensitive to the network topology, nodes distribution and traffic load. In this paper, we generalize the virtual carrier sense collision avoidance approach to reduce packet collisions in multicast communications. The sender and receivers exchange RTS and CTS packets to reserve the channel. When more than one receivers reply with CTS packets, the sender will detect an "expected" collision which may be interpreted as a valid "clear-to-send" signal provided the collision satisfies the given timing requirements. Together with a receiver-initiated local recovery mechanism, the reliability and packet delivery ratio can be improved to close to 100%.

  • Mobile IP Assistance in Ad Hoc Routing Security Using Geometric Properties of Lines

    Ting-Yi CHANG  Chou-Chen YANG  Chia-Meng CHEN  

     
    PAPER-Terrestrial Radio Communications

      Vol:
    E88-B No:6
      Page(s):
    2557-2565

    Recently, the integration of wired and wireless networks has become an interesting issue. The introduction of extending Mobile IP to mobile ad hoc networks not only helps the mobile nodes connect to the Internet but also broadens the scope of the ad hoc networks and increases their application. However, these hybrid schemes faces several security problems from the inherent weakness of ad hoc routing. In this paper, we propose a hybrid authentication scheme of Mobile IP assistance for ad hoc routing security. The regular Mobile IP registration scheme has been refined to an ad hoc key-aided version and now incorporates a novel routing packet authentication mechanism in the ad hoc routing operation. A distinct character of this hybrid scheme is that a Mobile Agent can form a secure ad hoc network where the mobile hosts can be authorized and authenticated by the refined Mobile IP registration scheme. In these findings, we shall propose that the mobile hosts can follow a novel routing packet authentication mechanism to secure the routing packets by using the cryptography of the simple geometric properties of lines. Since the novel routing authentication mechanism does not need digital signatures for completing the routing packet integrity, in this hybrid authentication scheme, the cryptographic computation cost on the mobile hosts' side is relatively minimized.

  • A New MAC Protocol for Improving the End-to-End Performance in Multi-Hop Wireless Ad Hoc Networks

    Jaikwan JOO  Sunghak LEE  Hyunsoo YOON  

     
    LETTER-Ad Hoc Network

      Vol:
    E87-B No:9
      Page(s):
    2638-2640

    Since IEEE 802.11 has many problems such as hidden node, exposed node problem, larger sensing function and BEB (Binary Exponential Back-off), it is not suitable for use in multi-hop wireless ad hoc network. When an on-demand routing protocol is used with 802.11 DCF (Distributed Coordination Function), the route to transmit the packet will be formed by nodes which have less competition (fewer neighbors) than others for the medium access. This effect will make that the routing path will be longer and decrease network performance. Therefore, we propose a new MAC (Medium Access Control) protocol that makes a shorter routing path, enabling better performance in multi-hop wireless ad hoc networks. The protocol modifying IEEE 802.11 DCF gives priority to the node with more neighbors and with less transmission. Through simulations, we have demonstrated that the proposed algorithm improves performance in terms of transmission rate, transmission delay and total consumption energy.

  • Neighbor-Medium-Aware MAC Protocol with Fairness for Wireless Ad Hoc Networks

    Yongkang XIAO  Lin ZHANG  Xiuming SHAN  Yong REN  Zhengxin MA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E87-B No:9
      Page(s):
    2738-2746

    The unfairness problem among TCP connections has been proved to be very severe in the IEEE 802.11-based wireless ad hoc networks because the hidden station problem still exists and the binary exponential backoff algorithm always favors the latest successful station. In this paper, a novel protocol, neighbor-medium-aware MAC (NEMA-MAC), is proposed to improve the TCP fairness. By adding a medium (channel) state field in the head of the traditional IEEE 802.11 MAC frame, the NEMA-MAC protocol provides a communication mechanism to resolve the hidden station problem. In addition, when a collision occurs, the new backoff algorithm makes the senders cooperatively adjust the contention window according to their local and neighbors' channel usage indexes. The simulation results show that TCP sessions can acquire satisfying fairness and increase the throughput in the NEMA-MAC-based multihop ad hoc networks.

  • Bandwidth Constrained Energy Efficient Transmission Protocol in Wireless Sensor Networks

    Jain-Shing LIU  Chun-Hung Richard LIN  

     
    PAPER-Network

      Vol:
    E86-B No:10
      Page(s):
    3039-3049

    The conventional clustering method has the unique potential to be the framework for power-conserving ad hoc networks. In this environment, studies on energy-efficient strategies such as sleeping mode and redirection have been reported, and recently some have even been adopted by some standards like Bluetooth and IEEE 802.11. However, consider wireless sensor networks. The devices employed are power-limited in nature, introducing the conventional clustering approach to the sensor networks provides a unique challenge due to the fact that cluster-heads, which are communication centers by default, tend to be heavily utilized and thus drained of their battery power rapidly. In this paper, we introduce a re-clustering strategy and a power-limit constraint for cluster-based wireless sensor networks in order to address the power-conserving issues in such networks, while maintaining the merits of a clustering approach. Based on a practical energy model, simulation results show that the improved clustering method can achieve a lifetime nearly 3 times that of a conventional one.