1-20hit |
Nguyen Minh TUAN Kohei WATABE Pham Thanh GIANG Kenji NAKAGAWA
Wireless Ad hoc networks have been rapidly developed in recent years since they promise a wide range of applications. However, their structures, which are based on the IEEE 802.11 standard, cause a severe unfairness problem in bandwidth sharing among different users. This is an extreme drawback because in wireless ad hoc networks, all users need to be treated fairly regardless of their geographical positions. In this paper, we propose a method to improve the fairness among flows by sensing channel access of other nodes based on the information obtained at the link layer and then, controlling the packet sending rate from the link layer to the MAC layer and the dequeue rate from the queue. Simulation results show that the proposed method achieves a better fairness with a good total throughput compared to conventional methods.
KyengHeum NA DaeHee KIM SunShin AN
In this paper, MWAN (Mobile Wireless Ad hoc Networks with internet connection) is considered, which is a solution for many tasks owing to its ease of use, and practicality. Recently, MWAN is required to support large data like multimedia data transfer and it is transferred through several relay nodes. There are 2 problems that cause difficulties for large data transfer through a mobile network. First one is rerouting delay by handoff and second one is network congestion caused by handoff. Also, faulty data transfer caused by handoff delay makes extra load and causes some problems for MWAN. To solve these problems and get network reliability, we propose a new multipath routing scheme that can provide solution for seamless connection while handoff. In the proposed scheme, our MWAN can support multiple paths for data transfer, maintain end-to-end connection while handoff and get new route quickly. The performance of the proposed scheme is evaluated and compared with other multipath routing scheme to show the improvement.
Network survivability is defined as the ability of a network keeping connected under failures and/or attacks. In this paper, we propose two stochastic models; binomial model and negative binomial model, to quantify the network survivability and compare them with the existing Poisson model. We give mathematical formulae of approximate network survivability for respective models and use them to carry out the sensitivity analysis on model parameters. Throughout numerical examples it is shown that the network survivability can change drastically when the number of network nodes is relatively small under a severe attack mode which is called the Black hole attack.
Chen-Hua SHIH Jun-Li KUO Yaw-Chung CHEN
Establishing peer-to-peer (P2P) live streaming for mobile ad hoc network (MANET) requires an efficient scheme to deliver the real-time data in the infrastructure-less disaster environment. However, P2P membership management is difficult in the dynamic mobility and resource limited MANET. In this paper, we present a cross-layer design for P2P-MANET which integrates P2P DHT-based routing protocol and IPv6 routing protocol. Therefore, the proposed scheme can manage and recover the P2P overlay as well as selecting efficient routing path to multicast video streaming. The simulation results demonstrate that the proposed scheme performs relatively better than the layered approach or the off-the-shelf design in terms of the playback continuity and signaling overhead.
Jun-Li KUO Chen-Hua SHIH Cheng-Yuan HO Ming-Ching WANG Yaw-Chung CHEN
In the infrastructure-less disaster environment, the application of the peer-to-peer (P2P) group conference over mobile ad hoc network (MANET) can be used to communicate with each other when the rescue crews search the survivors but work separately. However, there still are several problems of in-time multimedia delivery in P2P-MANET: (1) MANET mobility influences the maintenance of P2P overlay. (2) P2P overlay is not proximal to MANET topology, this leads to the inefficient streaming delivery. (3) The unreliable wireless connection leads to the difficulty of multi-source P2P group conferencing. Therefore, P2P conferencing cannot work well on MANET. To overcome the above disadvantages, in this paper, we present a cross-layer P2P group conferencing mechanism over MANET, called RING (Real-time Intercommunication Network Gossip). The RING uses the ring overlay to manage peers and utilizes the cross-layer mechanism to force the ring overlay to be proximal to MANET topology. Therefore, RING can lead efficient in-time multimedia streaming delivery. On the other hand, the ring overlay can deal with peer joining/leaving fast and simply, and improves the delivery efficiency with the minimum signaling overhead. Through mathematical theory and a series of experiments, we demonstrate that RING is workable and it can shorten the source-to-end delay with minimal signaling overhead.
Jin Seok KIM Dae Hyun YUM Sung Je HONG Jong KIM Pil Joong LEE
As deployment of wireless ad hoc networks for location-based services increases, accurate localization of mobile nodes is becoming more important. Localization of a mobile node is achieved by estimating its distances from a group of anchor nodes. If some anchors are malicious and colluding, localization accuracy cannot be guaranteed. In this article, we present the security conditions for exact localization in the presence of colluding malicious anchors. We first derive the minimum number of truthful anchors that are required for exact localization in 2-D Euclidean space where some anchors may be collinear. Second, we extend our security condition to 3-D localization where some anchors may be coplanar.
Feng LI Jie WU Avinash SRINIVASAN
Link and node trustworthiness are important metrics in wireless ad hoc networks. Many existing wireless ad hoc network routing algorithms assume the availability of precise trustworthiness information. This, however, is an unrealistic assumption given the dynamics of wireless ad hoc networks. Therefore, a realistic method is needed to evaluate trustworthiness by mitigating uncertainty in the estimation process. In this paper, we propose a novel trustworthiness estimation model that accounts for uncertainty as well as two uncertainty mitigation schemes. We then illustrate the effectiveness of our schemes using a utility-oriented routing algorithm as a sample application. An extensive simulation study shows that these two uncertainty mitigation schemes significantly increase path stability and the long-term total benefit of the wireless ad hoc network.
Data query is one of the most important issues in wireless ad hoc networks, since the ultimate goal of these networks is to support efficient data sharing among wireless nodes. In this paper, we study the issue of data query for delay-sensitive applications in dense wireless ad hoc networks. We focus our attention on step-by-step expanding ring-based data query, which provides an upper bound on query delay to any expanding ring based query strategies. Two replication strategies including Index Replication (IR) and Data Replication (DR) are considered, to improve the delay performance of data query. We analyze the probabilistic behavior of query delay for both DR and IR by theoretical methods, and develop analytical models to approximate the minimum number of replicas required for both query strategies if an application-specified delay bound is imposed. Our work is validated through extensive simulations.
The mobility control of mobile nodes can be an alternative to the transmitting power adjustment in case that fixed transmitting power is just used in the topology control. Assuming the controllable mobility of nodes, we propose four distributed mobility control algorithms assuring the network connectivity and the capacity improvement. We compare the throughput of each algorithm with the widely accepted capacity scale law considering the energy consumption. The proposed mobility-based topology control algorithms are named according to its operational characteristics; RP (Rendezvous Point), NNT (Nearest Neighbor Tracking), DM (Diffusion Model), and GP (Grid Packing). Through extensive simulations, we show that all the proposed algorithms successfully change a partitioned random network topology into a connected network topology without the power control. Furthermore, the topology reconfigured by the mobility control has the improved network capacity beyond that of the initial network. In the newly defined performance metric, effective capacity, the simulation results show that GP provides more improved and stable performance over various node densities with the short completion time.
In wireless ad hoc networks, providing an authentication service to verify that the broadcast packet is from the claimed sender without modification, is challenging due mainly to the inherently lossy wireless links. This paper presents a novel Secure and Reliable Broadcasting that reinforces the broadcast authentication with reliability and energy-efficiency capabilities by using the cooperative diversity to superimpose two distinct signals. The proposed protocol achieves significant savings of transmission power and fair assurance of reliability among receivers.
Toshiro NUNOME Shuji TASAKA Ken NAKAOKA
This paper performs application-level QoS and user-level QoS assessment of audio-video streaming in cross-layer designed wireless ad hoc networks. In order to achieve high QoS at the user-level, we employ link quality-based routing in the network layer and media synchronization control in the application layer. We adopt three link quality-based routing protocols: OLSR-SS (Signal Strength), AODV-SS, and LQHR (Link Quality-Based Hybrid Routing). OLSR-SS is a proactive routing protocol, while AODV-SS is a reactive one. LQHR is a hybrid protocol, which is a combination of proactive and reactive routing protocols. For application-level QoS assessment, we performed computer simulation with ns-2 where an IEEE 802.11b mesh topology network with 24 nodes was assumed. We also assessed user-level QoS by a subjective experiment with 30 assessors. From the assessment results, we find AODV-SS the best for networks with long inter-node distances, while LQHR outperforms AODV-SS for short inter-node distances. In addition, we also examine characteristics of the three schemes with respect to the application-level QoS in random topology networks.
Takahiro MATSUDA Taku NOGUCHI Tetsuya TAKINE
In this paper, we consider the broadcast storm problem in dense wireless ad hoc networks where interference among densely populated wireless nodes causes significant packet loss. To resolve the problem, we apply randomized network coding (RNC) to the networks. RNC is a completely different approach from existing techniques to resolve the problem, and it reduces the number of outstanding packets in the networks by encoding several packets into a single packet. RNC is a kind of linear network coding, and it is suited to wireless ad hoc networks because it can be implemented in a completely distributed manner. We describe a procedure for implementing the wireless ad hoc broadcasting with RNC. Further, with several simulation scenarios, we provide some insights on the relationship between the system parameters and performance and find that there is the optimal length of coding vectors for RNC in terms of packet loss probability. We also show a guideline for the parameter setting to resolve the broadcast storm problem successfully.
Tomofumi SAKAGUCHI Yukihiro KAMIYA Takeo FUJII Yasuo SUZUKI
Wireless ad hoc communications such as ad hoc networks have been attracting researchers' attention. They are expected to become a key technology for "ubiquitous" networking because of the ability to configure wireless links by nodes autonomously, without any centralized control facilities. Adaptive array antennas (AAA) have been expected to improve the network efficiency by taking advantage of its adaptive beamforming capability. However, it should be noted that AAA is not almighty. Its interference cancellation capability is limited by the degree-of-freedom (DOF) and the angular resolution as a function of the number of element antennas. Application of AAA without attending to these problems can degrade the efficiency of the network. Let us consider wireless ad hoc communication as a target application for AAA, taking advantage of AAA's interference cancellation capability. The low DOF and insufficient resolution will be crucial problems compared to other wireless systems, since there is no centralized facility to control the nodes to avoid interferences in such systems. A number of interferences might impinge on a node from any direction of arrival (DOA) without any timing control. In this paper, focusing on such limitations of AAA applied in ad hoc communications, we propose a new scheme, Forward Interference Avoidance (FIA), using AAA for ad hoc communications in order to avoid problems caused by the limitation of the AAA capability. It enables nodes to avoid interfering with other nodes so that it increases the number of co-existent wireless links. The performance improvement of ad hoc communications in terms of the number of co-existent links is investigated through computer simulations.
Xuedan ZHANG Jun HONG Lin ZHANG Xiuming SHAN Victor O. K. LI
This paper addresses the issue of transmission scheduling in wireless ad hoc networks. We propose a Time Division Multiple Access (TDMA) scheduling scheme based on edge coloring and probabilistic assignment, called CP-TDMA. We categorize the conflicts suffered by wireless links into two types: explicit conflicts and implicit conflicts, and utilize two different strategies to deal with them. Explicit conflicts are avoided completely by a simple distributed edge-coloring algorithm µ-M, and implicit conflicts are minimized by applying probabilistic time slot assignments to links. We evaluate CP-TDMA analytically and numerically, and find that CP-TDMA, which requires only local information exhibits a better performance than previous work.
This paper proposes the MultiPath streaming scheme with Media Synchronization control (MPMS) for audio-video transmission in wireless ad hoc networks. In many audio-video streaming applications, media compensate each other from a perceptual point of view. On the basis of this property, we treat the two streams as separate transport streams, and then the source transmits them into two different routes if multiple routes to the destination are available. The multipath transmission disturbs the temporal structure of the streams; in MPMS, the disturbance is remedied by media synchronization control. In order to implement MPMS in this paper, we enhance the existing Dynamic Source Routing (DSR) protocol. We compare the application-level QoS of MPMS and three other schemes for audio-video transmission by simulation with ns-2. In the simulation, we also assess the influence of the multipath transmission on other traffic. The simulation result shows that MPMS is effective in achieving high QoS at the application-level.
The basic carrier sense multi-access control scheme for multicast communications in wireless ad hoc networks suffers from the well know hidden terminal problem. The data packet collision probability is relatively high, and the packet delivery ratio is sensitive to the network topology, nodes distribution and traffic load. In this paper, we generalize the virtual carrier sense collision avoidance approach to reduce packet collisions in multicast communications. The sender and receivers exchange RTS and CTS packets to reserve the channel. When more than one receivers reply with CTS packets, the sender will detect an "expected" collision which may be interpreted as a valid "clear-to-send" signal provided the collision satisfies the given timing requirements. Together with a receiver-initiated local recovery mechanism, the reliability and packet delivery ratio can be improved to close to 100%.
Ting-Yi CHANG Chou-Chen YANG Chia-Meng CHEN
Recently, the integration of wired and wireless networks has become an interesting issue. The introduction of extending Mobile IP to mobile ad hoc networks not only helps the mobile nodes connect to the Internet but also broadens the scope of the ad hoc networks and increases their application. However, these hybrid schemes faces several security problems from the inherent weakness of ad hoc routing. In this paper, we propose a hybrid authentication scheme of Mobile IP assistance for ad hoc routing security. The regular Mobile IP registration scheme has been refined to an ad hoc key-aided version and now incorporates a novel routing packet authentication mechanism in the ad hoc routing operation. A distinct character of this hybrid scheme is that a Mobile Agent can form a secure ad hoc network where the mobile hosts can be authorized and authenticated by the refined Mobile IP registration scheme. In these findings, we shall propose that the mobile hosts can follow a novel routing packet authentication mechanism to secure the routing packets by using the cryptography of the simple geometric properties of lines. Since the novel routing authentication mechanism does not need digital signatures for completing the routing packet integrity, in this hybrid authentication scheme, the cryptographic computation cost on the mobile hosts' side is relatively minimized.
Jaikwan JOO Sunghak LEE Hyunsoo YOON
Since IEEE 802.11 has many problems such as hidden node, exposed node problem, larger sensing function and BEB (Binary Exponential Back-off), it is not suitable for use in multi-hop wireless ad hoc network. When an on-demand routing protocol is used with 802.11 DCF (Distributed Coordination Function), the route to transmit the packet will be formed by nodes which have less competition (fewer neighbors) than others for the medium access. This effect will make that the routing path will be longer and decrease network performance. Therefore, we propose a new MAC (Medium Access Control) protocol that makes a shorter routing path, enabling better performance in multi-hop wireless ad hoc networks. The protocol modifying IEEE 802.11 DCF gives priority to the node with more neighbors and with less transmission. Through simulations, we have demonstrated that the proposed algorithm improves performance in terms of transmission rate, transmission delay and total consumption energy.
Yongkang XIAO Lin ZHANG Xiuming SHAN Yong REN Zhengxin MA
The unfairness problem among TCP connections has been proved to be very severe in the IEEE 802.11-based wireless ad hoc networks because the hidden station problem still exists and the binary exponential backoff algorithm always favors the latest successful station. In this paper, a novel protocol, neighbor-medium-aware MAC (NEMA-MAC), is proposed to improve the TCP fairness. By adding a medium (channel) state field in the head of the traditional IEEE 802.11 MAC frame, the NEMA-MAC protocol provides a communication mechanism to resolve the hidden station problem. In addition, when a collision occurs, the new backoff algorithm makes the senders cooperatively adjust the contention window according to their local and neighbors' channel usage indexes. The simulation results show that TCP sessions can acquire satisfying fairness and increase the throughput in the NEMA-MAC-based multihop ad hoc networks.
Jain-Shing LIU Chun-Hung Richard LIN
The conventional clustering method has the unique potential to be the framework for power-conserving ad hoc networks. In this environment, studies on energy-efficient strategies such as sleeping mode and redirection have been reported, and recently some have even been adopted by some standards like Bluetooth and IEEE 802.11. However, consider wireless sensor networks. The devices employed are power-limited in nature, introducing the conventional clustering approach to the sensor networks provides a unique challenge due to the fact that cluster-heads, which are communication centers by default, tend to be heavily utilized and thus drained of their battery power rapidly. In this paper, we introduce a re-clustering strategy and a power-limit constraint for cluster-based wireless sensor networks in order to address the power-conserving issues in such networks, while maintaining the merits of a clustering approach. Based on a practical energy model, simulation results show that the improved clustering method can achieve a lifetime nearly 3 times that of a conventional one.