A dynamical model is constructed to depict the spatial-temporal evolution of malware in mobile wireless sensor networks(MWSNs). Based on such a model, we design a hybrid control scheme combining parameter perturbation...A dynamical model is constructed to depict the spatial-temporal evolution of malware in mobile wireless sensor networks(MWSNs). Based on such a model, we design a hybrid control scheme combining parameter perturbation and state feedback to effectively manipulate the spatiotemporal dynamics of malware propagation. The hybrid control can not only suppress the Turing instability caused by diffusion factor but can also adjust the occurrence of Hopf bifurcation induced by time delay. Numerical simulation results show that the hybrid control strategy can efficiently manipulate the transmission dynamics to achieve our expected desired properties, thus reducing the harm of malware propagation to MWSNs.展开更多
In the contemporary era of unprecedented innovations such as Internet of Things(IoT),modern applications cannot be imagined without the presence of Wireless Sensor Network(WSN).Nodes in WSN use neighbour discovery(ND)...In the contemporary era of unprecedented innovations such as Internet of Things(IoT),modern applications cannot be imagined without the presence of Wireless Sensor Network(WSN).Nodes in WSN use neighbour discovery(ND)protocols to have necessary communication among the nodes.Neighbour discovery process is crucial as it is to be done with energy efficiency and minimize discovery latency and maximize percentage of neighbours discovered.The current ND approaches that are indirect in nature are categorized into methods of removal of active slots from wake-up schedules and intelligent addition of new slots.The two methods are found to have certain drawbacks.Thefirst category disturbs original integrity of wake-up schedules leading to reduced chances of discovering new nodes in WSN as neighbours.When second category is followed,it may have inefficient slots in the wake-up schedules leading to performance degradation.Therefore,the motivation behind the work in this paper is that by combining the two categories,it is possible to reap benefits of both and get rid of the limitations of the both.Making a hybrid is achieved by introducing virtual nodes that help maximize performance by ensuring original integrity of wake-up schedules and adding of efficient active slots.Thus a Hybrid Approach to Neighbour Discovery(HAND)protocol is realized in WSN.The simulation study revealed that HAND outperforms the existing indirect ND models.展开更多
Energy supply is one of the most critical challenges of wireless sensor networks(WSNs)and industrial wireless sensor networks(IWSNs).While research on coverage optimization problem(COP)centers on the network’s monito...Energy supply is one of the most critical challenges of wireless sensor networks(WSNs)and industrial wireless sensor networks(IWSNs).While research on coverage optimization problem(COP)centers on the network’s monitoring coverage,this research focuses on the power banks’energy supply coverage.The study of 2-D and 3-D spaces is typical in IWSN,with the realistic environment being more complex with obstacles(i.e.,machines).A 3-D surface is the field of interest(FOI)in this work with the established hybrid power bank deployment model for the energy supply COP optimization of IWSN.The hybrid power bank deployment model is highly adaptive and flexible for new or existing plants already using the IWSN system.The model improves the power supply to a more considerable extent with the least number of power bank deployments.The main innovation in this work is the utilization of a more practical surface model with obstacles and training while improving the convergence speed and quality of the heuristic algorithm.An overall probabilistic coverage rate analysis of every point on the FOI is provided,not limiting the scope to target points or areas.Bresenham’s algorithm is extended from 2-D to 3-D surface to enhance the probabilistic covering model for coverage measurement.A dynamic search strategy(DSS)is proposed to modify the artificial bee colony(ABC)and balance the exploration and exploitation ability for better convergence toward eliminating NP-hard deployment problems.Further,the cellular automata(CA)is utilized to enhance the convergence speed.The case study based on two typical FOI in the IWSN shows that the CA scheme effectively speeds up the optimization process.Comparative experiments are conducted on four benchmark functions to validate the effectiveness of the proposed method.The experimental results show that the proposed algorithm outperforms the ABC and gbest-guided ABC(GABC)algorithms.The results show that the proposed energy coverage optimization method based on the hybrid power bank deployment model generates more accurate results than the results obtained by similar algorithms(i.e.,ABC,GABC).The proposed model is,therefore,effective and efficient for optimization in the IWSN.展开更多
Transmission pipelines are vulnerable to various accidents and acts of vandalism.Therefore,a reliable monitoring system is needed to secure the transmission pipelines.A wireless sensor network is a wireless network co...Transmission pipelines are vulnerable to various accidents and acts of vandalism.Therefore,a reliable monitoring system is needed to secure the transmission pipelines.A wireless sensor network is a wireless network consisting of distributed devices distributed at various distances,which monitors the physical and environmental conditions using sensors.Wireless sensor networks have many uses,including the built-in sensor on the outside of the pipeline or installed to support bridge structures,robotics,healthcare,environmental monitoring,etc.Wireless Sensor networks could be used to monitor the temperature,pressure,leak detection and sabotage of transmission lines.Wireless sensor networks are vulnerable to various attacks.Cryptographic algorithms have a good role in information security for wireless sensor networks.Now,various types of cryptographic algorithms provide security in networks,but there are still some problems.In this research,to improve the power of these algorithms,a new hybrid encryption algorithm for monitoring energy transmission lines and increasing the security of wireless sensor networks is proposed.The proposed hybrid encryption algorithm provides the security and timely transmission of data in wireless sensor networks to monitor the transmission pipelines.The proposed algorithm fulfills three principles of cryptography:integrity,confidentiality and authentication.The details of the algorithm and basic concepts are presented in such a way that the algorithm can be operational.展开更多
Wireless sensor networks are a collection of intelligent sensor devices that are connected to one another and have the capability to exchange information packets amongst themselves.In recent years,this field of resear...Wireless sensor networks are a collection of intelligent sensor devices that are connected to one another and have the capability to exchange information packets amongst themselves.In recent years,this field of research has become increasingly popular due to the host of useful applications it can potentially serve.A deep analysis of the concepts associated with this domain reveals that the two main problems that are to be tackled here are throughput enhancement and network security improvement.The present article takes on one of these two issues namely the throughput enhancement.For the purpose of improving network productivity,a hybrid clustering based packet propagation protocol has been proposed.The protocol makes use of not only clustering mechanisms of machine learning but also utilizes the traditional forwarding function approach to arrive at an optimum model.The result of the simulation is a novel transmission protocol which significantly enhances network productivity and increases throughput value.展开更多
The previous research on administration of the transmission capacity in the wired/ wireless ATM networks only focuses on wired part or wireless part. There are very few people do the work extending to the links associ...The previous research on administration of the transmission capacity in the wired/ wireless ATM networks only focuses on wired part or wireless part. There are very few people do the work extending to the links associating with handoff in the whole network. This paper develops the algorithms of transmission capacity administration on the link connecting the base station and base station controller (including the air interface of the base station) and the VPs among the base station controllers in the wired/ wireless ATM networks, which adapt to the traffic state of each service in every cellular cell to allocate (provision) transmission capacity and to reserve handoff guard capacity on these links, respectively. By simulating and analyzing the performance of the algorithm, it is found that it does well for the multimedia communication in which the transmission capacity requirement of each service may be widely different, so that the network bandwidth resource can be used efficiently.展开更多
This study develops an optimal performance monitoring metric for a hybrid free space optical and radio wireless network, the Outage Capacity Objective Function. The objective function—the dependence of hybrid channel...This study develops an optimal performance monitoring metric for a hybrid free space optical and radio wireless network, the Outage Capacity Objective Function. The objective function—the dependence of hybrid channel outage capacity upon the error rate, jointly quantifies the effects of atmospheric optical impairments on the performance of the free space optical segment as well as the effect of RF channel impairments on the radio frequency segment. The objective function is developed from the basic information-theoretic capacity of the optical and radio channels using the gamma-gamma model for optical fading and Ricean statistics for the radio channel fading. A simulation is performed by using the hybrid network. The objective function is shown to provide significantly improved sensitivity to degrading performance trends and supports of proactive link failure prediction and mitigation when compared to current thresholding techniques for signal quality metrics.展开更多
Wireless sensor networks (WSNs) are mostly deployed in a remote working environment, since sensor nodes are small in size, cost-efficient, low-power devices, and have limited battery power supply. Because of limited p...Wireless sensor networks (WSNs) are mostly deployed in a remote working environment, since sensor nodes are small in size, cost-efficient, low-power devices, and have limited battery power supply. Because of limited power source, energy consumption has been considered as the most critical factor when designing sensor network protocols. The network lifetime mainly depends on the battery lifetime of the node. The main concern is to increase the lifetime with respect to energy constraints. One way of doing this is by turning off redun-dant nodes to sleep mode to conserve energy while active nodes can provide essential k-coverage, which improves fault-tolerance. Hence, we use scheduling algorithms that turn off redundant nodes after providing the required coverage level k. The scheduling algorithms can be implemented in centralized or localized schemes, which have their own advantages and disadvantages. To exploit the advantages of both schemes, we employ both schemes on the network according to a threshold value. This threshold value is estimated on the performance of WSN based on network lifetime comparison using centralized and localized algorithms. To extend the network lifetime and to extract the useful energy from the network further, we go for compromise in the area covered by nodes.展开更多
The Wireless Sensor Networks(WSN)is a self-organizing network with random deployment of wireless nodes that connects each other for effective monitoring and data transmission.The clustering technique employed to group...The Wireless Sensor Networks(WSN)is a self-organizing network with random deployment of wireless nodes that connects each other for effective monitoring and data transmission.The clustering technique employed to group the collection of nodes for data transmission and each node is assigned with a cluster head.The major concern with the identification of the cluster head is the consideration of energy consumption and hence this paper proposes an hybrid model which forms an energy efficient cluster head in the Wireless Sensor Network.The proposed model is a hybridization of Glowworm Swarm Optimization(GSO)and Artificial Bee Colony(ABC)algorithm for the better identification of cluster head.The performance of the proposed model is compared with the existing techniques and an energy analysis is performed and is proved to be more efficient than the existing model with normalized energy of 5.35%better value and reduction of time complexity upto 1.46%.Above all,the proposed model is 16%ahead of alive node count when compared with the existing methodologies.展开更多
In order to make up for the deficiencies and insufficiencies that In order to make up for the deficiencies and insufficiencies that wireless sensor network is constituted absolutely by static or dynamic sensor nodes. ...In order to make up for the deficiencies and insufficiencies that In order to make up for the deficiencies and insufficiencies that wireless sensor network is constituted absolutely by static or dynamic sensor nodes. So a deployment mechanism for hybrid nodes barrier coverage (HNBC)is proposed in wireless sensor network, which collaboratively consists of static and dynamic sensor nodes. We introduced the Voronoi diagram to divide the whole deployment area. According to the principle of least square method, and the static nodes are used to construct the reference barrier line (RBL). And we implemented effectively barrier coverage by monitoring whether there is a coverage hole in the deployment area, and then to determine whether dynamic nodes need limited mobility to redeploy the monitoring area. The simulation results show that the proposed algorithm improved the coverage quality, and completed the barrier coverage with less node moving distance and lower energy consumption, and achieved the expected coverage requirements展开更多
With the rapid development and widespread application of Wireless Body Area Networks(WBANs),the traditional centralized system architecture cannot handle the massive data generated by the edge devices.Meanwhile,in ord...With the rapid development and widespread application of Wireless Body Area Networks(WBANs),the traditional centralized system architecture cannot handle the massive data generated by the edge devices.Meanwhile,in order to ensure the security of physiological privacy data and the identity privacy of patients,this paper presents a privacy protection strategy for Mobile Edge Computing(MEC)enhanced WBANs,which leverages the blockchain-based decentralized MEC paradigm to support efficient transmission of privacy information with low latency,high reliability within a high-demand data security scenario.On this basis,the Merkle tree optimization model is designed to authenticate nodes and to verify the source of physiological data.Furthermore,a hybrid signature algorithm is devised to guarantee the node anonymity with unforgeability,data integrity and reduced delay.The security performance analysis and simulation results show that our proposed strategy not only reduces the delay,but also secures the privacy and transmission of sensitive WBANs data.展开更多
Due to their easy-to-deploy and self-healing features, WMNs (Wireless Mesh Networks) are emerging as a new promising technology with a rich set of applications. While the IEEE standardization of this new technology is...Due to their easy-to-deploy and self-healing features, WMNs (Wireless Mesh Networks) are emerging as a new promising technology with a rich set of applications. While the IEEE standardization of this new technology is still in progress, its main traits are already set, e.g., architecture and MAC routing. WMNs are attracting considerable research in academia and industry as well, but the lack of open-source testbeds is restricting such a research to simulation tools. The main problem with simulation tools is that they do not reflect the complexity of RF propagation, especially in indoor environments, of which IEEE 802.11s WMNs are an example. This paper presents an open-source implementation of an indoor IEEE 802.11s WMN testbed. The implementation is transparent, easy-to-deploy, and both the source code and deployment instructions are available online. The implementation can serve as a blueprint for the WMN research community to deploy their own testbeds, negating the shortcomings of using simulation tools. By delving into the testbed implementation subtleties, this paper is shedding further light on the details of the ongoing IEEE 802.11s standard. Major encountered implementation problems (e.g., clients association, Internetworking, and supporting multiple gateways) are identified and addressed. To ascertain the functionality of the testbed, both UDP and TCP traffic are supported and operational. The testbed uses the default IEEE 802.11s HWMP (Hybrid Wireless Mesh Protocol) routing protocol along with the default IEEE 802.11s Airtime routing metric.展开更多
Real-time applications usually not only have a certain Packet Loss Ratio (PLR) requirement but also can have strict delay constraints. In the past, we proposed a Hybrid Error Correction (HEC) scheme with Packet Repeti...Real-time applications usually not only have a certain Packet Loss Ratio (PLR) requirement but also can have strict delay constraints. In the past, we proposed a Hybrid Error Correction (HEC) scheme with Packet Repetition (PR) technique for guaranteeing a certain PLR requirement under strict delay constraints. Unfortunately, the HEC-PR scheme can only work efficiently in multicast scenarios with small group size and small link PLR. Our further studies show that better performance can be obtained by combining the HEC-PR scheme with other traditional HEC schemes such as Type I HARQ and Type II HARQ techniques. Based on this idea, in this paper, a novel Adaptive HEC (AHEC) scheme combining the HEC-PR scheme with Type I and Type II HARQ techniques is proposed to satisfy a certain PLR requirement for delay bounded multicast services. Furthermore, the performance of the AHEC scheme is optimized by choosing the scheme with the least needed redundancy information automatically among the three HEC schemes. Finally, by applying the AHEC scheme in a typical wireless DVB scenario, we analyze the performances of the AHEC scheme and compare it with the HEC-PR scheme and an Adaptive Forward Error Correction (AFEC) scheme. The results show that the proposed AHEC scheme outperforms both the AFEC scheme and the HEC-PR scheme.展开更多
More subtle and explicit QoS control mechanisms are required at the radio access level, even though the simple and scalable Differentiated Services (DiffServ) QoS control model is acceptable for the core of the networ...More subtle and explicit QoS control mechanisms are required at the radio access level, even though the simple and scalable Differentiated Services (DiffServ) QoS control model is acceptable for the core of the network. At the radio access level, available resources are severely limited and the degree of traffic aggregation is not significant, thus rendering the DiffServ principles less effective. In this paper we present a suitable hybrid QoS architecture framework to address the problem. At the wireless access end, the local QoS mechanism is designed in the context of IEEE 802.11 WLAN with 802.11e QoS extensions;so streams of those session-based applications are admitted, established according to the traffic profile they require, and guaranteed. As the core in the Admission Control of the hybrid QoS architecture, the Fair Intelligent Congestion Control (FICC) algorithm is applied to provide fairness among traffic aggregates and control congestion at the bottleneck interface between the wireless link and the network core via mechanisms of packet scheduling, buffer management, feedback and adjustments. It manages effectively the overloading scenario by preventing traffic violation from uncontrolled traffic, and providing guarantee to the priority traffic in terms of guaranteed bandwidth allocation and specified delay.展开更多
In this paper, we proposed an algorithm to estimate the reliability of a hybrid computer communication network. A hybrid computer network is a network that consists of wire and wireless sub networks. The proposed algo...In this paper, we proposed an algorithm to estimate the reliability of a hybrid computer communication network. A hybrid computer network is a network that consists of wire and wireless sub networks. The proposed algorithm is built upon using a simulation model due to the complexity of the network topology. We tested the proposed algorithm, and the results show consistency in the reliability estimates.展开更多
基金Project supported by the National Natural Science Foundation of China (Grant No. 62073172)the Natural Science Foundation of Jiangsu Province of China (Grant No. BK20221329)。
文摘A dynamical model is constructed to depict the spatial-temporal evolution of malware in mobile wireless sensor networks(MWSNs). Based on such a model, we design a hybrid control scheme combining parameter perturbation and state feedback to effectively manipulate the spatiotemporal dynamics of malware propagation. The hybrid control can not only suppress the Turing instability caused by diffusion factor but can also adjust the occurrence of Hopf bifurcation induced by time delay. Numerical simulation results show that the hybrid control strategy can efficiently manipulate the transmission dynamics to achieve our expected desired properties, thus reducing the harm of malware propagation to MWSNs.
文摘In the contemporary era of unprecedented innovations such as Internet of Things(IoT),modern applications cannot be imagined without the presence of Wireless Sensor Network(WSN).Nodes in WSN use neighbour discovery(ND)protocols to have necessary communication among the nodes.Neighbour discovery process is crucial as it is to be done with energy efficiency and minimize discovery latency and maximize percentage of neighbours discovered.The current ND approaches that are indirect in nature are categorized into methods of removal of active slots from wake-up schedules and intelligent addition of new slots.The two methods are found to have certain drawbacks.Thefirst category disturbs original integrity of wake-up schedules leading to reduced chances of discovering new nodes in WSN as neighbours.When second category is followed,it may have inefficient slots in the wake-up schedules leading to performance degradation.Therefore,the motivation behind the work in this paper is that by combining the two categories,it is possible to reap benefits of both and get rid of the limitations of the both.Making a hybrid is achieved by introducing virtual nodes that help maximize performance by ensuring original integrity of wake-up schedules and adding of efficient active slots.Thus a Hybrid Approach to Neighbour Discovery(HAND)protocol is realized in WSN.The simulation study revealed that HAND outperforms the existing indirect ND models.
文摘Energy supply is one of the most critical challenges of wireless sensor networks(WSNs)and industrial wireless sensor networks(IWSNs).While research on coverage optimization problem(COP)centers on the network’s monitoring coverage,this research focuses on the power banks’energy supply coverage.The study of 2-D and 3-D spaces is typical in IWSN,with the realistic environment being more complex with obstacles(i.e.,machines).A 3-D surface is the field of interest(FOI)in this work with the established hybrid power bank deployment model for the energy supply COP optimization of IWSN.The hybrid power bank deployment model is highly adaptive and flexible for new or existing plants already using the IWSN system.The model improves the power supply to a more considerable extent with the least number of power bank deployments.The main innovation in this work is the utilization of a more practical surface model with obstacles and training while improving the convergence speed and quality of the heuristic algorithm.An overall probabilistic coverage rate analysis of every point on the FOI is provided,not limiting the scope to target points or areas.Bresenham’s algorithm is extended from 2-D to 3-D surface to enhance the probabilistic covering model for coverage measurement.A dynamic search strategy(DSS)is proposed to modify the artificial bee colony(ABC)and balance the exploration and exploitation ability for better convergence toward eliminating NP-hard deployment problems.Further,the cellular automata(CA)is utilized to enhance the convergence speed.The case study based on two typical FOI in the IWSN shows that the CA scheme effectively speeds up the optimization process.Comparative experiments are conducted on four benchmark functions to validate the effectiveness of the proposed method.The experimental results show that the proposed algorithm outperforms the ABC and gbest-guided ABC(GABC)algorithms.The results show that the proposed energy coverage optimization method based on the hybrid power bank deployment model generates more accurate results than the results obtained by similar algorithms(i.e.,ABC,GABC).The proposed model is,therefore,effective and efficient for optimization in the IWSN.
文摘Transmission pipelines are vulnerable to various accidents and acts of vandalism.Therefore,a reliable monitoring system is needed to secure the transmission pipelines.A wireless sensor network is a wireless network consisting of distributed devices distributed at various distances,which monitors the physical and environmental conditions using sensors.Wireless sensor networks have many uses,including the built-in sensor on the outside of the pipeline or installed to support bridge structures,robotics,healthcare,environmental monitoring,etc.Wireless Sensor networks could be used to monitor the temperature,pressure,leak detection and sabotage of transmission lines.Wireless sensor networks are vulnerable to various attacks.Cryptographic algorithms have a good role in information security for wireless sensor networks.Now,various types of cryptographic algorithms provide security in networks,but there are still some problems.In this research,to improve the power of these algorithms,a new hybrid encryption algorithm for monitoring energy transmission lines and increasing the security of wireless sensor networks is proposed.The proposed hybrid encryption algorithm provides the security and timely transmission of data in wireless sensor networks to monitor the transmission pipelines.The proposed algorithm fulfills three principles of cryptography:integrity,confidentiality and authentication.The details of the algorithm and basic concepts are presented in such a way that the algorithm can be operational.
文摘Wireless sensor networks are a collection of intelligent sensor devices that are connected to one another and have the capability to exchange information packets amongst themselves.In recent years,this field of research has become increasingly popular due to the host of useful applications it can potentially serve.A deep analysis of the concepts associated with this domain reveals that the two main problems that are to be tackled here are throughput enhancement and network security improvement.The present article takes on one of these two issues namely the throughput enhancement.For the purpose of improving network productivity,a hybrid clustering based packet propagation protocol has been proposed.The protocol makes use of not only clustering mechanisms of machine learning but also utilizes the traditional forwarding function approach to arrive at an optimum model.The result of the simulation is a novel transmission protocol which significantly enhances network productivity and increases throughput value.
文摘The previous research on administration of the transmission capacity in the wired/ wireless ATM networks only focuses on wired part or wireless part. There are very few people do the work extending to the links associating with handoff in the whole network. This paper develops the algorithms of transmission capacity administration on the link connecting the base station and base station controller (including the air interface of the base station) and the VPs among the base station controllers in the wired/ wireless ATM networks, which adapt to the traffic state of each service in every cellular cell to allocate (provision) transmission capacity and to reserve handoff guard capacity on these links, respectively. By simulating and analyzing the performance of the algorithm, it is found that it does well for the multimedia communication in which the transmission capacity requirement of each service may be widely different, so that the network bandwidth resource can be used efficiently.
文摘This study develops an optimal performance monitoring metric for a hybrid free space optical and radio wireless network, the Outage Capacity Objective Function. The objective function—the dependence of hybrid channel outage capacity upon the error rate, jointly quantifies the effects of atmospheric optical impairments on the performance of the free space optical segment as well as the effect of RF channel impairments on the radio frequency segment. The objective function is developed from the basic information-theoretic capacity of the optical and radio channels using the gamma-gamma model for optical fading and Ricean statistics for the radio channel fading. A simulation is performed by using the hybrid network. The objective function is shown to provide significantly improved sensitivity to degrading performance trends and supports of proactive link failure prediction and mitigation when compared to current thresholding techniques for signal quality metrics.
文摘Wireless sensor networks (WSNs) are mostly deployed in a remote working environment, since sensor nodes are small in size, cost-efficient, low-power devices, and have limited battery power supply. Because of limited power source, energy consumption has been considered as the most critical factor when designing sensor network protocols. The network lifetime mainly depends on the battery lifetime of the node. The main concern is to increase the lifetime with respect to energy constraints. One way of doing this is by turning off redun-dant nodes to sleep mode to conserve energy while active nodes can provide essential k-coverage, which improves fault-tolerance. Hence, we use scheduling algorithms that turn off redundant nodes after providing the required coverage level k. The scheduling algorithms can be implemented in centralized or localized schemes, which have their own advantages and disadvantages. To exploit the advantages of both schemes, we employ both schemes on the network according to a threshold value. This threshold value is estimated on the performance of WSN based on network lifetime comparison using centralized and localized algorithms. To extend the network lifetime and to extract the useful energy from the network further, we go for compromise in the area covered by nodes.
文摘The Wireless Sensor Networks(WSN)is a self-organizing network with random deployment of wireless nodes that connects each other for effective monitoring and data transmission.The clustering technique employed to group the collection of nodes for data transmission and each node is assigned with a cluster head.The major concern with the identification of the cluster head is the consideration of energy consumption and hence this paper proposes an hybrid model which forms an energy efficient cluster head in the Wireless Sensor Network.The proposed model is a hybridization of Glowworm Swarm Optimization(GSO)and Artificial Bee Colony(ABC)algorithm for the better identification of cluster head.The performance of the proposed model is compared with the existing techniques and an energy analysis is performed and is proved to be more efficient than the existing model with normalized energy of 5.35%better value and reduction of time complexity upto 1.46%.Above all,the proposed model is 16%ahead of alive node count when compared with the existing methodologies.
文摘In order to make up for the deficiencies and insufficiencies that In order to make up for the deficiencies and insufficiencies that wireless sensor network is constituted absolutely by static or dynamic sensor nodes. So a deployment mechanism for hybrid nodes barrier coverage (HNBC)is proposed in wireless sensor network, which collaboratively consists of static and dynamic sensor nodes. We introduced the Voronoi diagram to divide the whole deployment area. According to the principle of least square method, and the static nodes are used to construct the reference barrier line (RBL). And we implemented effectively barrier coverage by monitoring whether there is a coverage hole in the deployment area, and then to determine whether dynamic nodes need limited mobility to redeploy the monitoring area. The simulation results show that the proposed algorithm improved the coverage quality, and completed the barrier coverage with less node moving distance and lower energy consumption, and achieved the expected coverage requirements
基金This work was supported in part by the National Natural Science Foundation of China(61871062,61771082 and 61901071)in part by the Program for Innovation Team Building at Institutions of Higher Education in Chongqing(CXTDX201601020)+1 种基金Science and Technology Research Program of Chongqing Municipal Education Commission(KJQN201800615)General Project of Natural Science Foundation of Chongqing(cstc2019jcyj-msxm1238).
文摘With the rapid development and widespread application of Wireless Body Area Networks(WBANs),the traditional centralized system architecture cannot handle the massive data generated by the edge devices.Meanwhile,in order to ensure the security of physiological privacy data and the identity privacy of patients,this paper presents a privacy protection strategy for Mobile Edge Computing(MEC)enhanced WBANs,which leverages the blockchain-based decentralized MEC paradigm to support efficient transmission of privacy information with low latency,high reliability within a high-demand data security scenario.On this basis,the Merkle tree optimization model is designed to authenticate nodes and to verify the source of physiological data.Furthermore,a hybrid signature algorithm is devised to guarantee the node anonymity with unforgeability,data integrity and reduced delay.The security performance analysis and simulation results show that our proposed strategy not only reduces the delay,but also secures the privacy and transmission of sensitive WBANs data.
文摘Due to their easy-to-deploy and self-healing features, WMNs (Wireless Mesh Networks) are emerging as a new promising technology with a rich set of applications. While the IEEE standardization of this new technology is still in progress, its main traits are already set, e.g., architecture and MAC routing. WMNs are attracting considerable research in academia and industry as well, but the lack of open-source testbeds is restricting such a research to simulation tools. The main problem with simulation tools is that they do not reflect the complexity of RF propagation, especially in indoor environments, of which IEEE 802.11s WMNs are an example. This paper presents an open-source implementation of an indoor IEEE 802.11s WMN testbed. The implementation is transparent, easy-to-deploy, and both the source code and deployment instructions are available online. The implementation can serve as a blueprint for the WMN research community to deploy their own testbeds, negating the shortcomings of using simulation tools. By delving into the testbed implementation subtleties, this paper is shedding further light on the details of the ongoing IEEE 802.11s standard. Major encountered implementation problems (e.g., clients association, Internetworking, and supporting multiple gateways) are identified and addressed. To ascertain the functionality of the testbed, both UDP and TCP traffic are supported and operational. The testbed uses the default IEEE 802.11s HWMP (Hybrid Wireless Mesh Protocol) routing protocol along with the default IEEE 802.11s Airtime routing metric.
文摘Real-time applications usually not only have a certain Packet Loss Ratio (PLR) requirement but also can have strict delay constraints. In the past, we proposed a Hybrid Error Correction (HEC) scheme with Packet Repetition (PR) technique for guaranteeing a certain PLR requirement under strict delay constraints. Unfortunately, the HEC-PR scheme can only work efficiently in multicast scenarios with small group size and small link PLR. Our further studies show that better performance can be obtained by combining the HEC-PR scheme with other traditional HEC schemes such as Type I HARQ and Type II HARQ techniques. Based on this idea, in this paper, a novel Adaptive HEC (AHEC) scheme combining the HEC-PR scheme with Type I and Type II HARQ techniques is proposed to satisfy a certain PLR requirement for delay bounded multicast services. Furthermore, the performance of the AHEC scheme is optimized by choosing the scheme with the least needed redundancy information automatically among the three HEC schemes. Finally, by applying the AHEC scheme in a typical wireless DVB scenario, we analyze the performances of the AHEC scheme and compare it with the HEC-PR scheme and an Adaptive Forward Error Correction (AFEC) scheme. The results show that the proposed AHEC scheme outperforms both the AFEC scheme and the HEC-PR scheme.
文摘More subtle and explicit QoS control mechanisms are required at the radio access level, even though the simple and scalable Differentiated Services (DiffServ) QoS control model is acceptable for the core of the network. At the radio access level, available resources are severely limited and the degree of traffic aggregation is not significant, thus rendering the DiffServ principles less effective. In this paper we present a suitable hybrid QoS architecture framework to address the problem. At the wireless access end, the local QoS mechanism is designed in the context of IEEE 802.11 WLAN with 802.11e QoS extensions;so streams of those session-based applications are admitted, established according to the traffic profile they require, and guaranteed. As the core in the Admission Control of the hybrid QoS architecture, the Fair Intelligent Congestion Control (FICC) algorithm is applied to provide fairness among traffic aggregates and control congestion at the bottleneck interface between the wireless link and the network core via mechanisms of packet scheduling, buffer management, feedback and adjustments. It manages effectively the overloading scenario by preventing traffic violation from uncontrolled traffic, and providing guarantee to the priority traffic in terms of guaranteed bandwidth allocation and specified delay.
文摘In this paper, we proposed an algorithm to estimate the reliability of a hybrid computer communication network. A hybrid computer network is a network that consists of wire and wireless sub networks. The proposed algorithm is built upon using a simulation model due to the complexity of the network topology. We tested the proposed algorithm, and the results show consistency in the reliability estimates.