Security vulnerability of denial of service (DoS) in time out-medium access control (T-MAC) protocol was discussed and analysis of power consumption at each stage of T-MAC protocol was carried out. For power efficient...Security vulnerability of denial of service (DoS) in time out-medium access control (T-MAC) protocol was discussed and analysis of power consumption at each stage of T-MAC protocol was carried out. For power efficient authentication scheme which can provide reliability, efficiency, and security for a general T-MAC communication, a novel synchronization and authentication scheme using authentication masking code was proposed. Authentication data were repeated and masked by PN sequence. The simulation results show that the proposed approach can provide synchronization and authentication simultaneously for nodes in wireless sensor network (WSN). 63 bits AMC code gives above 99.97% synchronization detection and 93.98% authentication data detection probability in BER 0.031 7.展开更多
This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided in...This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided into common channel,broadcast channel and several data chan-nels. And dynamic power control mechanism is implemented to reduce near-far interference. Compared with IEEE 802.11 Distributed Coordination Function (DCF) protocol,the results show that the pro-posed mechanism improves the average throughput and limits the transmission delay efficiently.展开更多
A novel access protocol called Multiple-Reception Access Protocol (WRAP) and its modification MRAP/WI are proposed. In this protocol, all colliding users with a common code can be identified by the base station due to...A novel access protocol called Multiple-Reception Access Protocol (WRAP) and its modification MRAP/WI are proposed. In this protocol, all colliding users with a common code can be identified by the base station due to the offset of arrival time. Thus they can retransmit access requests under the base station's control. Furthermore new arrivals with higher priority level can interrupt the lower retransmission in order to reduce its access delay although it, increases the lower priority's delay. Simulation results of MRAP and MRAP/WI are given in order to highlight the superior performance of the proposed approach.展开更多
The characteristics of underwater acoustic channel such as long propagation delay and low bit rate cause the MAC(Medium Access Control) protocols designed for radio channels to be either inapplicable,or have low effic...The characteristics of underwater acoustic channel such as long propagation delay and low bit rate cause the MAC(Medium Access Control) protocols designed for radio channels to be either inapplicable,or have low efficiency for UWSN(Underwater Sensor Network).We propose a hierarchical and distributed code assignment algorithm based on divisive probability function which can avoid conflict between spread codes with high probability,and provide a statebased MAC protocol for UWSN.Without RTS/CTS(Request To Send/Clear To Send) handshaking,each node maintains a neighbor table including state field,and packages are forwarded according to the state of the receiver,so it can avoid the interference caused by transmitting to a sending node in a half-duplex system and improve channel utilization.The design of power control minimizes the nearfar effect inherent in CDMA.Simulation results reveal that state-based CDMA protocol shows outstanding performance in throughput,delivery ratio and resource-consumption.展开更多
This paper investigates the medium access control (MAC) stratifies for communication systems. Since the signals are naturally superposed in public medium, we introduce physical layer network coding into MAC system a...This paper investigates the medium access control (MAC) stratifies for communication systems. Since the signals are naturally superposed in public medium, we introduce physical layer network coding into MAC system and propose the physical layer network coded MAC (PNC-MAC) to utilize the collisions occurring in the MAC process. The implicit expressions of the throughput and average delay of the system operated with the new algorithm are derived in an iterative way. To show the performance of the algorithm, we compare the throughput and average delay induced by the new algorithm with current schemes via simulations. The results show that when operated with our proposed PNC-MAC, MAC system can achieve a larger throughput while the frames bear shorter average delay. Moreover, in many users case, the throughput increases slightly while the average delay ascends drastically.展开更多
The Lee weight enumerators and the complete weight enumerators for the linear codes over ring R = F2 + u F2 + v F2 are defined and Gray map from R^nto F2^3n is constructed. By proving the fact that the Gray images o...The Lee weight enumerators and the complete weight enumerators for the linear codes over ring R = F2 + u F2 + v F2 are defined and Gray map from R^nto F2^3n is constructed. By proving the fact that the Gray images of the self-dual codes over R are the self-dual codes over F2, and based on the Mac Williams identities for the Hamming weight enumerators of linear codes over F2, the Mac Williams identities for Lee weight enumerators of linear codes over R are given. Further, by introducing a special variable t, the Mac Williams identities for the complete weight enumerators of linear codes over R are obtained. Finally, an example which illustrates the correctness and function of the two Mac Williams identities is provided.展开更多
文摘Security vulnerability of denial of service (DoS) in time out-medium access control (T-MAC) protocol was discussed and analysis of power consumption at each stage of T-MAC protocol was carried out. For power efficient authentication scheme which can provide reliability, efficiency, and security for a general T-MAC communication, a novel synchronization and authentication scheme using authentication masking code was proposed. Authentication data were repeated and masked by PN sequence. The simulation results show that the proposed approach can provide synchronization and authentication simultaneously for nodes in wireless sensor network (WSN). 63 bits AMC code gives above 99.97% synchronization detection and 93.98% authentication data detection probability in BER 0.031 7.
基金Supported by the Science Foundation of Shanghai Mu-nicipal Commission of Science and Technology under contract 045115012.
文摘This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided into common channel,broadcast channel and several data chan-nels. And dynamic power control mechanism is implemented to reduce near-far interference. Compared with IEEE 802.11 Distributed Coordination Function (DCF) protocol,the results show that the pro-posed mechanism improves the average throughput and limits the transmission delay efficiently.
文摘A novel access protocol called Multiple-Reception Access Protocol (WRAP) and its modification MRAP/WI are proposed. In this protocol, all colliding users with a common code can be identified by the base station due to the offset of arrival time. Thus they can retransmit access requests under the base station's control. Furthermore new arrivals with higher priority level can interrupt the lower retransmission in order to reduce its access delay although it, increases the lower priority's delay. Simulation results of MRAP and MRAP/WI are given in order to highlight the superior performance of the proposed approach.
基金supported by the Program for New Century Excellent Talents in University of China(NCET-11-1025)the NationalNatural Science Foundation of China(No.61162003,61163050,6126104)+1 种基金Qinghai office of science and technology(grant No.2012-Z-902)the Natural Science Foundation of Tianjin(No.10JCYBJC00600)
文摘The characteristics of underwater acoustic channel such as long propagation delay and low bit rate cause the MAC(Medium Access Control) protocols designed for radio channels to be either inapplicable,or have low efficiency for UWSN(Underwater Sensor Network).We propose a hierarchical and distributed code assignment algorithm based on divisive probability function which can avoid conflict between spread codes with high probability,and provide a statebased MAC protocol for UWSN.Without RTS/CTS(Request To Send/Clear To Send) handshaking,each node maintains a neighbor table including state field,and packages are forwarded according to the state of the receiver,so it can avoid the interference caused by transmitting to a sending node in a half-duplex system and improve channel utilization.The design of power control minimizes the nearfar effect inherent in CDMA.Simulation results reveal that state-based CDMA protocol shows outstanding performance in throughput,delivery ratio and resource-consumption.
文摘This paper investigates the medium access control (MAC) stratifies for communication systems. Since the signals are naturally superposed in public medium, we introduce physical layer network coding into MAC system and propose the physical layer network coded MAC (PNC-MAC) to utilize the collisions occurring in the MAC process. The implicit expressions of the throughput and average delay of the system operated with the new algorithm are derived in an iterative way. To show the performance of the algorithm, we compare the throughput and average delay induced by the new algorithm with current schemes via simulations. The results show that when operated with our proposed PNC-MAC, MAC system can achieve a larger throughput while the frames bear shorter average delay. Moreover, in many users case, the throughput increases slightly while the average delay ascends drastically.
基金supported by the Natural Science Foundation of Hubei Province under Grant No.D20144401the Natural Science Foundation of Hubei Polytechnic University under Grant Nos.12xjz14A,11yjz37B
文摘The Lee weight enumerators and the complete weight enumerators for the linear codes over ring R = F2 + u F2 + v F2 are defined and Gray map from R^nto F2^3n is constructed. By proving the fact that the Gray images of the self-dual codes over R are the self-dual codes over F2, and based on the Mac Williams identities for the Hamming weight enumerators of linear codes over F2, the Mac Williams identities for Lee weight enumerators of linear codes over R are given. Further, by introducing a special variable t, the Mac Williams identities for the complete weight enumerators of linear codes over R are obtained. Finally, an example which illustrates the correctness and function of the two Mac Williams identities is provided.