Hybrid networking of power line and wireless communication can complement each other,save construction costs,improve network robustness,and has important value on the Internet of Things and smart grid.For power line a...Hybrid networking of power line and wireless communication can complement each other,save construction costs,improve network robustness,and has important value on the Internet of Things and smart grid.For power line and wireless dual-interface devices,a media access control(MAC)layer algorithm for hybrid communication is proposed,in which the stations can compete for two channels simultaneously.When a station obtains two channels at the same time,the station will randomly select a channel for transmission to ensure fairness,and reset the counters when the transmission is successful.In this paper,the performance of the unsaturated traffic model and counter spatial division is considered,and the throughput under coupling conditions is obtained.Finally,the simulation results show that the MAC layer algorithm based on the hybrid communication network can make full use of the advantages of the two channels,improve system throughput,and reduce transmission delay.展开更多
As a smart spectrum sharing technology, Cognitive Radio (CR) is becoming a hot topic in the field of wireless telecommunications. Besides providing traditional services, the cognitive radio network Media Access Contro...As a smart spectrum sharing technology, Cognitive Radio (CR) is becoming a hot topic in the field of wireless telecommunications. Besides providing traditional services, the cognitive radio network Media Access Control (MAC) layer is required to perform an entirely new set of functions for effective reusing spectrum opportunity, without causing any harmful interference to incumbents. Spectrum sensing management selects and optimizes sensing strategies and parameters by the selection of sensing mode, sensing period, sensing time, sensing channel, and sensing quiet period. Access control avoids collision with primary users mainly by cooperation access and transparent access. Dynamic spectrum allocation optimizes the allocation of uncertain spectrum for binary interference model and accumulative interference model. Security mechanism adds authentication and encryption mechanisms to MAC frame to defense MAC layer security attacks. Cross-layer design combines MAC layer information with physical layer or higher layers information, such as network layer, transmission layer, to achieve global optimization.展开更多
The attribute access methods of MAC layer in wireless communication network is researched. Aiming at conquering the problem of the shared ZigBee wireless channel resulting multi-channel device conflicts when using the...The attribute access methods of MAC layer in wireless communication network is researched. Aiming at conquering the problem of the shared ZigBee wireless channel resulting multi-channel device conflicts when using the data channel at the same time, therefore the protocol is improved and a method used to access the properties of ZigBee is proposed, and this method can be achieved to manage effectively for all the 29 properties MAC layer, save storage space and realize property maintenance and expansion.展开更多
Medium access control (MAC) protocols such as IEEE 802.11 are used in wireless networks for sharing of the wireless medium. The random nature of the protocol operation together with the inherent difficulty of monito...Medium access control (MAC) protocols such as IEEE 802.11 are used in wireless networks for sharing of the wireless medium. The random nature of the protocol operation together with the inherent difficulty of monitoring in the open poses significant challenges. All nodes are expected to comply with the protocol rules. But, some nodes in order to gain greater benefits misbehave by not complying with the rules. One such selfish misbehavior is waiting for smaller back-off intervals when compared to the other nodes in the same subnet. Such selfish misbehavior is being tackled in this paper. A diagnosis scheme and a penalty scheme are being proposed for overcoming such selfish-misbehavior at MAC layer of mobile ad hoc networks which could be extended to other types of networks also.展开更多
In the past decades,with the widespread implementation of wireless networks,such as the Internet of Things,an enormous demand for designing relative algorithms for various realistic scenarios has arisen.However,with t...In the past decades,with the widespread implementation of wireless networks,such as the Internet of Things,an enormous demand for designing relative algorithms for various realistic scenarios has arisen.However,with the widening of scales and deepening of network layers,it has become increasingly challenging to design such algorithms when the issues of message dissemination at high levels and the contention management at the physical layer are considered.Accordingly,the abstract medium access control(absMAC)layer,which was proposed in2009,is designed to solve this problem.Specifically,the absMAC layer consists of two basic operations for network agents:the acknowledgement operation to broadcast messages to all neighbors and the progress operation to receive messages from neighbors.The absMAC layer divides the wireless algorithm design into two independent and manageable components,i.e.,to implement the absMAC layer over a physical network and to solve higher-level problems based on the acknowledgement and progress operations provided by the absMAC layer,which makes the algorithm design easier and simpler.In this study,we consider the implementation of the absMAC layer under jamming.An efficient algorithm is proposed to implement the absMAC layer,attached with rigorous theoretical analyses and extensive simulation results.Based on the implemented absMAC layer,many high-level algorithms in non-jamming cases can be executed in a jamming network.展开更多
Recent advancements in wireless communications have allowed the birth of novel wireless sensor networks(WSN).A sensor network comprises several micro-sensors deployed randomly in an area of interest.A micro-sensor is ...Recent advancements in wireless communications have allowed the birth of novel wireless sensor networks(WSN).A sensor network comprises several micro-sensors deployed randomly in an area of interest.A micro-sensor is provided with an energy resource to supply electricity to all of its components.However,the disposed energy resource is limited and battery replacement is generally infeasible.With this restriction,the sensors must conserve energy to prolong their lifetime.Various energy conservation strategies for WSNs have been presented in the literature,from the application to the physical layer.Most of these solutions focus only on optimizing a single layer in terms of energy consumption.In this research,a novel cross-layer technique for WSNs’effective energy usage is presented.Because most energy consumption factors exist in the Medium Access Control(MAC)layer and network layer,our EECLP protocol(Energy Efficient Cross-Layer Protocol for Wireless Sensor Networks)integrates these two layers to satisfy energy efficiency criteria.To gain access to the transmission channel,we implement a communication regime at the MAC layer based on CSMA/CA(Carrier Sense Multiple Access/Collision Avoidance)techniques.Next,depending on the activity and a standby period,we employ the RTS/CTS(Request to Send/Clear to Send)method to prevent collisions and resolve hidden node concerns by utilizing the network allocation vector(NAV)to calculate the transmission duration.Employing a greedy strategy,we establish chains amongst cluster members to mitigate the issue of high energy consumption in routing data.An objective function was utilized to determine the optimal cross-chain path based on the distances to the base station(BS)and residual energy(RE).The simulation,testing,and comparison of the proposed protocol to peer protocols have shown superior outcomes and a prolonged network lifespan.Using the suggested protocol,the network lifetime increases by 10%compared to FAMACO(Fuzzy and Ant Colony Optimization based MAC/Routing Cross-layer)protocol,and it increases by 90%and 95%compared to IFUC(Improved Fuzzy Unequal Clustering)and UHEED(Unequal Hybrid Energy Efficient and Distributed)protocols successively.展开更多
In a sustainable development context, the monitoring systems are essential to study the building energy performances. With the recent technology advances, these systems can be based on wireless sensor networks, where ...In a sustainable development context, the monitoring systems are essential to study the building energy performances. With the recent technology advances, these systems can be based on wireless sensor networks, where the energy efficiency is the main design challenge. To this end, most of the studies focus on low power Medium Access Control (MAC) protocols to reduce the overall energy consumption of a network. Nevertheless, the performances assessment of these protocols is generally not performed in a realistic way, and does not take into account the performances of the other layers of the OSI model. In this paper, we propose a cross-layer methodology to assess the real performances of a MAC protocol by taking into account the traffic volume, the synchronization losses and more particularly the physical layer performances through a Bit Error Rate (BER) criterion. The simulation results demonstrate clearly the physical layer impact on a sensor lifetime. Finally, the proposal of an energy efficient MAC protocol for a wireless sensor network dedicated to an application of building monitoring is proposed.展开更多
For the high end-to-end channel capacity, the amplify-and-forward scheme multiple-hop MIMO relays system is considered. The distance between each transceiver is optimized to prevent some relays from being the bottlene...For the high end-to-end channel capacity, the amplify-and-forward scheme multiple-hop MIMO relays system is considered. The distance between each transceiver is optimized to prevent some relays from being the bottleneck and guarantee the high end-to-end channel capacity. However, in some cases, the location of relays can’t be set at the desired location, the transmit power of each relay should be optimized. Additionally, in order to achieve the higher end-to-end channel capacity, the distance and the transmit power are optimized simultaneously. We propose the Markov Chain Monte Carlo method to optimize both the distance and the transmit power in complex propagation environments. Moreover, when the system has no control over transmission of each relay, the interference signal is presented and the performance of system is deteriorated. The general protocol of control transmission for each relay on the MAC layer is analyzed and compared to the Carrier Sense Multiple Access-Collision Avoidance protocol. According to the number of relays, the Mac layer protocol for the highest end-to-end channel capacity is changed. We also analyze the end-to-end channel capacity when the number of antennas and relays tends to infinity.展开更多
电力线和无线混合通信可以优势互补提升电力物联网室内覆盖的综合性能。针对无线接入和电力线中继的混合通信场景,文章提出一种适用于两跳混合中继的通用MAC层算法。综合考虑物理层信道参数和MAC层的载波侦听多路访问(carrier sense mul...电力线和无线混合通信可以优势互补提升电力物联网室内覆盖的综合性能。针对无线接入和电力线中继的混合通信场景,文章提出一种适用于两跳混合中继的通用MAC层算法。综合考虑物理层信道参数和MAC层的载波侦听多路访问(carrier sense multiple access,CSMA)退避流程,建立了该MAC层算法的跨层性能分析模型,推导了两跳传输系统归一化吞吐量以及系统时延等性能;最后仿真验证了算法有效性和模型准确性,分析了物理层和MAC层关键参数影响系统性能的机理。与Basic-RTS/CTS算法相比,所提算法可有效提升系统吞吐量和时延性能。展开更多
Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern networks.Traditional detection systems often struggle to mitigate such atta...Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern networks.Traditional detection systems often struggle to mitigate such attacks in conventional and software-defined networking(SDN)environments.While Machine Learning(ML)models can distinguish between benign and malicious traffic,their limited feature scope hinders the detection of new zero-day or low-rate DDoS attacks requiring frequent retraining.In this paper,we propose a novel DDoS detection framework that combines Machine Learning(ML)and Ensemble Learning(EL)techniques to improve DDoS attack detection and mitigation in SDN environments.Our model leverages the“DDoS SDN”dataset for training and evaluation and employs a dynamic feature selection mechanism that enhances detection accuracy by focusing on the most relevant features.This adaptive approach addresses the limitations of conventional ML models and provides more accurate detection of various DDoS attack scenarios.Our proposed ensemble model introduces an additional layer of detection,increasing reliability through the innovative application of ensemble techniques.The proposed solution significantly enhances the model’s ability to identify and respond to dynamic threats in SDNs.It provides a strong foundation for proactive DDoS detection and mitigation,enhancing network defenses against evolving threats.Our comprehensive runtime analysis of Simultaneous Multi-Threading(SMT)on identical configurations shows superior accuracy and efficiency,with significantly reduced computational time,making it ideal for real-time DDoS detection in dynamic,rapidly changing SDNs.Experimental results demonstrate that our model achieves outstanding performance,outperforming traditional algorithms with 99%accuracy using Random Forest(RF)and K-Nearest Neighbors(KNN)and 98%accuracy using XGBoost.展开更多
在VoWLAN(VoIP over WLAN)系统中,当周期性语音业务与随机性数据业务混合传输时,面临着信道能容纳的话路数少、语音业务与数据业务获得信道的机会不可控等问题。IEEE802.11e协议在传输周期的无竞争期(CFP)采用混合协调功能(HCF)来解决...在VoWLAN(VoIP over WLAN)系统中,当周期性语音业务与随机性数据业务混合传输时,面临着信道能容纳的话路数少、语音业务与数据业务获得信道的机会不可控等问题。IEEE802.11e协议在传输周期的无竞争期(CFP)采用混合协调功能(HCF)来解决语音业务QoS问题。研究在IEEE802.11e的HCF机制基础上,对媒质接入控制(MAC)层进行了改进,对CFP时段的上行周期性语音采用无竞争预约排队信道接入(CFRQCA)机制取代HCF受控信道接入(HCCA)方式,在CFP时段的下行语音接入采用M-M(Multicast-Multiplexing)机制;为了协调语音业务与数据业务的接入机会,论文中还提出了一种基于业务流量监测的接入机会自适应调度算法(AOASA);理论分析和仿真表明,无竞争预约排队机制和接入机会自适应调度算法能显著提高信道容纳的话路数。展开更多
为了延长网络的寿命,实现能量的高效利用是无线传感器网络应用的主要目标,MAC协议的能效性直接关系到网络的能耗,但采用分层方法的MAC协议无法实现最优的节能效果。本文基于跨层的方法提出了一种能量高效MAC(cross layer energy efficie...为了延长网络的寿命,实现能量的高效利用是无线传感器网络应用的主要目标,MAC协议的能效性直接关系到网络的能耗,但采用分层方法的MAC协议无法实现最优的节能效果。本文基于跨层的方法提出了一种能量高效MAC(cross layer energy efficient MAC,CLEE-MAC)协议。该协议在自适应S-MAC(adaptive sensor MAC,AS-MAC)协议基础上,通过利用路由层的路由表信息,改变AS-MAC协议的控制帧格式,有效解决了AS-MAC协议中因"强迫唤醒"造成的能量浪费问题,延长了网络的寿命。理论分析和仿真验证均表明,随着节点密度的增加,CLEE-MAC协议的节能增益随网络密度线性增大。展开更多
基金supported in part by the National Natural Science Foundation of China (Nos. 61601182)in part Natural Science Foundation of Hebei Province (F2017502059)in part by the Fundamental Research Funds for the Central Universities under Grant 2021MS070
文摘Hybrid networking of power line and wireless communication can complement each other,save construction costs,improve network robustness,and has important value on the Internet of Things and smart grid.For power line and wireless dual-interface devices,a media access control(MAC)layer algorithm for hybrid communication is proposed,in which the stations can compete for two channels simultaneously.When a station obtains two channels at the same time,the station will randomly select a channel for transmission to ensure fairness,and reset the counters when the transmission is successful.In this paper,the performance of the unsaturated traffic model and counter spatial division is considered,and the throughput under coupling conditions is obtained.Finally,the simulation results show that the MAC layer algorithm based on the hybrid communication network can make full use of the advantages of the two channels,improve system throughput,and reduce transmission delay.
基金supported by the National Natural Science Foundation of China under Grant No.60772110.
文摘As a smart spectrum sharing technology, Cognitive Radio (CR) is becoming a hot topic in the field of wireless telecommunications. Besides providing traditional services, the cognitive radio network Media Access Control (MAC) layer is required to perform an entirely new set of functions for effective reusing spectrum opportunity, without causing any harmful interference to incumbents. Spectrum sensing management selects and optimizes sensing strategies and parameters by the selection of sensing mode, sensing period, sensing time, sensing channel, and sensing quiet period. Access control avoids collision with primary users mainly by cooperation access and transparent access. Dynamic spectrum allocation optimizes the allocation of uncertain spectrum for binary interference model and accumulative interference model. Security mechanism adds authentication and encryption mechanisms to MAC frame to defense MAC layer security attacks. Cross-layer design combines MAC layer information with physical layer or higher layers information, such as network layer, transmission layer, to achieve global optimization.
文摘The attribute access methods of MAC layer in wireless communication network is researched. Aiming at conquering the problem of the shared ZigBee wireless channel resulting multi-channel device conflicts when using the data channel at the same time, therefore the protocol is improved and a method used to access the properties of ZigBee is proposed, and this method can be achieved to manage effectively for all the 29 properties MAC layer, save storage space and realize property maintenance and expansion.
文摘Medium access control (MAC) protocols such as IEEE 802.11 are used in wireless networks for sharing of the wireless medium. The random nature of the protocol operation together with the inherent difficulty of monitoring in the open poses significant challenges. All nodes are expected to comply with the protocol rules. But, some nodes in order to gain greater benefits misbehave by not complying with the rules. One such selfish misbehavior is waiting for smaller back-off intervals when compared to the other nodes in the same subnet. Such selfish misbehavior is being tackled in this paper. A diagnosis scheme and a penalty scheme are being proposed for overcoming such selfish-misbehavior at MAC layer of mobile ad hoc networks which could be extended to other types of networks also.
基金partially supported by the National Key R&D Program of China(No.2019YFB2102600)the National Natural Science Foundation of China(NSFC)(No.61971269)。
文摘In the past decades,with the widespread implementation of wireless networks,such as the Internet of Things,an enormous demand for designing relative algorithms for various realistic scenarios has arisen.However,with the widening of scales and deepening of network layers,it has become increasingly challenging to design such algorithms when the issues of message dissemination at high levels and the contention management at the physical layer are considered.Accordingly,the abstract medium access control(absMAC)layer,which was proposed in2009,is designed to solve this problem.Specifically,the absMAC layer consists of two basic operations for network agents:the acknowledgement operation to broadcast messages to all neighbors and the progress operation to receive messages from neighbors.The absMAC layer divides the wireless algorithm design into two independent and manageable components,i.e.,to implement the absMAC layer over a physical network and to solve higher-level problems based on the acknowledgement and progress operations provided by the absMAC layer,which makes the algorithm design easier and simpler.In this study,we consider the implementation of the absMAC layer under jamming.An efficient algorithm is proposed to implement the absMAC layer,attached with rigorous theoretical analyses and extensive simulation results.Based on the implemented absMAC layer,many high-level algorithms in non-jamming cases can be executed in a jamming network.
基金This research was partially funded by the Algerian National Agency of Research and Development(DGRSDT-PRFU Project Number C00L07UN010120200001)The research was also partially funded by Mohammed Bin Rashid Smart Learning Program,United Arab Emirates(MBRSLP/06/23).
文摘Recent advancements in wireless communications have allowed the birth of novel wireless sensor networks(WSN).A sensor network comprises several micro-sensors deployed randomly in an area of interest.A micro-sensor is provided with an energy resource to supply electricity to all of its components.However,the disposed energy resource is limited and battery replacement is generally infeasible.With this restriction,the sensors must conserve energy to prolong their lifetime.Various energy conservation strategies for WSNs have been presented in the literature,from the application to the physical layer.Most of these solutions focus only on optimizing a single layer in terms of energy consumption.In this research,a novel cross-layer technique for WSNs’effective energy usage is presented.Because most energy consumption factors exist in the Medium Access Control(MAC)layer and network layer,our EECLP protocol(Energy Efficient Cross-Layer Protocol for Wireless Sensor Networks)integrates these two layers to satisfy energy efficiency criteria.To gain access to the transmission channel,we implement a communication regime at the MAC layer based on CSMA/CA(Carrier Sense Multiple Access/Collision Avoidance)techniques.Next,depending on the activity and a standby period,we employ the RTS/CTS(Request to Send/Clear to Send)method to prevent collisions and resolve hidden node concerns by utilizing the network allocation vector(NAV)to calculate the transmission duration.Employing a greedy strategy,we establish chains amongst cluster members to mitigate the issue of high energy consumption in routing data.An objective function was utilized to determine the optimal cross-chain path based on the distances to the base station(BS)and residual energy(RE).The simulation,testing,and comparison of the proposed protocol to peer protocols have shown superior outcomes and a prolonged network lifespan.Using the suggested protocol,the network lifetime increases by 10%compared to FAMACO(Fuzzy and Ant Colony Optimization based MAC/Routing Cross-layer)protocol,and it increases by 90%and 95%compared to IFUC(Improved Fuzzy Unequal Clustering)and UHEED(Unequal Hybrid Energy Efficient and Distributed)protocols successively.
文摘In a sustainable development context, the monitoring systems are essential to study the building energy performances. With the recent technology advances, these systems can be based on wireless sensor networks, where the energy efficiency is the main design challenge. To this end, most of the studies focus on low power Medium Access Control (MAC) protocols to reduce the overall energy consumption of a network. Nevertheless, the performances assessment of these protocols is generally not performed in a realistic way, and does not take into account the performances of the other layers of the OSI model. In this paper, we propose a cross-layer methodology to assess the real performances of a MAC protocol by taking into account the traffic volume, the synchronization losses and more particularly the physical layer performances through a Bit Error Rate (BER) criterion. The simulation results demonstrate clearly the physical layer impact on a sensor lifetime. Finally, the proposal of an energy efficient MAC protocol for a wireless sensor network dedicated to an application of building monitoring is proposed.
文摘For the high end-to-end channel capacity, the amplify-and-forward scheme multiple-hop MIMO relays system is considered. The distance between each transceiver is optimized to prevent some relays from being the bottleneck and guarantee the high end-to-end channel capacity. However, in some cases, the location of relays can’t be set at the desired location, the transmit power of each relay should be optimized. Additionally, in order to achieve the higher end-to-end channel capacity, the distance and the transmit power are optimized simultaneously. We propose the Markov Chain Monte Carlo method to optimize both the distance and the transmit power in complex propagation environments. Moreover, when the system has no control over transmission of each relay, the interference signal is presented and the performance of system is deteriorated. The general protocol of control transmission for each relay on the MAC layer is analyzed and compared to the Carrier Sense Multiple Access-Collision Avoidance protocol. According to the number of relays, the Mac layer protocol for the highest end-to-end channel capacity is changed. We also analyze the end-to-end channel capacity when the number of antennas and relays tends to infinity.
文摘电力线和无线混合通信可以优势互补提升电力物联网室内覆盖的综合性能。针对无线接入和电力线中继的混合通信场景,文章提出一种适用于两跳混合中继的通用MAC层算法。综合考虑物理层信道参数和MAC层的载波侦听多路访问(carrier sense multiple access,CSMA)退避流程,建立了该MAC层算法的跨层性能分析模型,推导了两跳传输系统归一化吞吐量以及系统时延等性能;最后仿真验证了算法有效性和模型准确性,分析了物理层和MAC层关键参数影响系统性能的机理。与Basic-RTS/CTS算法相比,所提算法可有效提升系统吞吐量和时延性能。
文摘Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern networks.Traditional detection systems often struggle to mitigate such attacks in conventional and software-defined networking(SDN)environments.While Machine Learning(ML)models can distinguish between benign and malicious traffic,their limited feature scope hinders the detection of new zero-day or low-rate DDoS attacks requiring frequent retraining.In this paper,we propose a novel DDoS detection framework that combines Machine Learning(ML)and Ensemble Learning(EL)techniques to improve DDoS attack detection and mitigation in SDN environments.Our model leverages the“DDoS SDN”dataset for training and evaluation and employs a dynamic feature selection mechanism that enhances detection accuracy by focusing on the most relevant features.This adaptive approach addresses the limitations of conventional ML models and provides more accurate detection of various DDoS attack scenarios.Our proposed ensemble model introduces an additional layer of detection,increasing reliability through the innovative application of ensemble techniques.The proposed solution significantly enhances the model’s ability to identify and respond to dynamic threats in SDNs.It provides a strong foundation for proactive DDoS detection and mitigation,enhancing network defenses against evolving threats.Our comprehensive runtime analysis of Simultaneous Multi-Threading(SMT)on identical configurations shows superior accuracy and efficiency,with significantly reduced computational time,making it ideal for real-time DDoS detection in dynamic,rapidly changing SDNs.Experimental results demonstrate that our model achieves outstanding performance,outperforming traditional algorithms with 99%accuracy using Random Forest(RF)and K-Nearest Neighbors(KNN)and 98%accuracy using XGBoost.
文摘在VoWLAN(VoIP over WLAN)系统中,当周期性语音业务与随机性数据业务混合传输时,面临着信道能容纳的话路数少、语音业务与数据业务获得信道的机会不可控等问题。IEEE802.11e协议在传输周期的无竞争期(CFP)采用混合协调功能(HCF)来解决语音业务QoS问题。研究在IEEE802.11e的HCF机制基础上,对媒质接入控制(MAC)层进行了改进,对CFP时段的上行周期性语音采用无竞争预约排队信道接入(CFRQCA)机制取代HCF受控信道接入(HCCA)方式,在CFP时段的下行语音接入采用M-M(Multicast-Multiplexing)机制;为了协调语音业务与数据业务的接入机会,论文中还提出了一种基于业务流量监测的接入机会自适应调度算法(AOASA);理论分析和仿真表明,无竞争预约排队机制和接入机会自适应调度算法能显著提高信道容纳的话路数。