The Wireless Mesh Network (WMN) has become a focus in research of wireless broadband communications . In a switching technologies - based wireless Mesh network, the entire network is regarded as an IP subnet, so it ca...The Wireless Mesh Network (WMN) has become a focus in research of wireless broadband communications . In a switching technologies - based wireless Mesh network, the entire network is regarded as an IP subnet, so it cannot be applied in situations where large coverage is required . The use of cooperative relaying technologies can improve the transmission rate and reliability of wireless link; while the wireless Mesh network, once integrated with cooperative relaying technologies and routing technologies , can improve its spectrum efficiency and cover a wide area . However, there are many problems to be solved with respect to standardization, key technologies research and industrialization. Therefore , the application of cooperative relaying technologies in wireless Mesh networks is still a great challenge .展开更多
Cognitive Wireless Mesh Networks(CWMN) is a novel wireless network which combines the advantage of Cognitive Radio(CR) and wireless mesh networks.CWMN can realize seamless in-tegration of heterogeneous wireless networ...Cognitive Wireless Mesh Networks(CWMN) is a novel wireless network which combines the advantage of Cognitive Radio(CR) and wireless mesh networks.CWMN can realize seamless in-tegration of heterogeneous wireless networks and achieve better radio resource utilization.However,it is particularly vulnerable due to its features of open medium,dynamic spectrum,dynamic topology,and multi-top routing,etc..Being a dynamic positive security strategy,intrusion detection can provide powerful safeguard to CWMN.In this paper,we introduce trust mechanism into CWMN with intrusion detection and present a trust establishment model based on intrusion detection.Node trust degree and the trust degree of data transmission channels between nodes are defined and an algorithm of calcu-lating trust degree is given based on distributed detection of attack to networks.A channel assignment and routing scheme is proposed,in which selects the trusted nodes and allocates data channel with high trust degree for the transmission between neighbor nodes to establish a trusted route.Simulation re-sults indicate that the scheme can vary channel allocation and routing dynamically according to network security state so as to avoid suspect nodes and unsafe channels,and improve the packet safe delivery fraction effectively.展开更多
The continuous increase of data transmission density in wireless mobile communications has posed a challenge to the system performance of Wireless Mesh Networks (WMNs ). There is a rule for wireless Ad hoc networks th...The continuous increase of data transmission density in wireless mobile communications has posed a challenge to the system performance of Wireless Mesh Networks (WMNs ). There is a rule for wireless Ad hoc networks that the average node capacity decreases while the number of nodes increases , so it is hard to establish a large - scale wireless Mesh network. Network scalability is very important for enhancing the adaptive networking capability of the wireless Mesh network. This article discusses key scalability technologies for Mesh Base Stations (BSs ) and Mesh Mobile Stations (MSs ), such as channel allocation, intelligent routing , multi- antenna , node classification, Quality of Service (QoS) differentiation and cooperative transmission.展开更多
In this paper, we propose an aware-based adaptive opportunistic retransmission control scheme for wireless multimedia Mesh networks. The proposed scheme provides maximum retransmis-sion count optimization based on env...In this paper, we propose an aware-based adaptive opportunistic retransmission control scheme for wireless multimedia Mesh networks. The proposed scheme provides maximum retransmis-sion count optimization based on environment-aware to improve packet relay probability. The scheme discriminates the types of packet loss in wireless link by means of environment information and selects the retransmission count by taking the IEEE 802.11 wireless channel characteristics into consideration. Furthermore, the maximum retransmission count of MAC is adjusted adaptively. Extensive simulations demonstrate that the proposed scheme significantly reduces packet collision probability and packet loss rate, and thus improves network throughput.展开更多
IEEE 802.11 based wireless mesh networks with directional antennas are expected to be a new promising technology and an economic approach for providing wireless broadband services in rural areas.In this paper,we discu...IEEE 802.11 based wireless mesh networks with directional antennas are expected to be a new promising technology and an economic approach for providing wireless broadband services in rural areas.In this paper,we discuss interference models and address how they can affect the design of channel assignment in rural mesh networks.We present a new channel assignment framework based on graph coloring for rural wireless mesh networks.The goal of the framework is to allow synchronously transmitting or receiving data from multiple neighbor links at the same time,and continuously doing full-duplex data transfer on every link,creating an efficient rural mesh network without interference.Channel assignment is shown to be NP-hard.We frame this channel allocation problem in terms of Adjacent Vertex Distinguishing Edge Coloring(AVDEC).Detailed assignment results on grid topology are presented and discussed.Furthermore,we design an algorithm.Finally,we evaluate the performance of the proposed algorithm through extensive simulations and show the algorithm is effective to the regular grid topologies,and the number of colors used by the algorithm is upper bounded by+1.Hence the algorithm guarantees that the number of channels available in standards such as IEEE802.11a is sufficient to have a valid AVDEC for many grid topologies.We also evaluate the proposed algorithm for arbitrary graphs.The algorithm provides a lower upper bound on the minimum number of channels to the AVDEC index channel assignment problem.展开更多
Intrusion is any unwanted activity that can disrupt the normal functions of wired or wireless networks. Wireless mesh networking technology has been pivotal in providing an affordable means to deploy a network and all...Intrusion is any unwanted activity that can disrupt the normal functions of wired or wireless networks. Wireless mesh networking technology has been pivotal in providing an affordable means to deploy a network and allow omnipresent access to users on the Internet. A multitude of emerging public services rely on the widespread, high-speed, and inexpensive connectivity provided by such networks. The absence of a centralized network infrastructure and open shared medium makes WMNs particularly susceptible to malevolent attacks, especially in multihop networks. Hence, it is becoming increasingly important to ensure privacy, security, and resilience when designing such networks. An effective method to detect possible internal and external attack vectors is to use an intrusion detection system. Although many Intrusion Detection Systems (IDSs) were proposed for Wireless Mesh Networks (WMNs), they can only detect intrusions in a particular layer. Because WMNs are vulnerable to multilayer security attacks, a cross-layer IDS are required to detect and respond to such attacks. In this study, we analyzed cross-layer IDS options in WMN environments. The main objective was to understand how such schemes detect security attacks at several OSI layers. The suggested IDS is verified in many scenarios, and the experimental results show its efficiency.展开更多
Communication security is a critical aspect of QoS provisioning in wireless mesh network (WMN). Because of the inherent characteristics of WMN, conventional security mechanisms cannot be applied. In order to guarant...Communication security is a critical aspect of QoS provisioning in wireless mesh network (WMN). Because of the inherent characteristics of WMN, conventional security mechanisms cannot be applied. In order to guarantee the communication security, a novel communication security mechanism is proposed. The mechanism uses a communication encryption scheme to encrypt data packets and employs a risk avoidance scheme to avoid the malicious nodes during communications. Simulation results indicate that the mechanism is able to provide secure communication effectively and reduce the damage of attacks through multiple paths.展开更多
A proactive routing protocol CL-OLSR (cross-layer based optimized link state routing) by using a brand-new routing metric CLM (cross-layer metric) is proposed. CL-OLSR takes into account four link quality impact f...A proactive routing protocol CL-OLSR (cross-layer based optimized link state routing) by using a brand-new routing metric CLM (cross-layer metric) is proposed. CL-OLSR takes into account four link quality impact factors in route calculation through the cross-layer operation mechanism: the node available bandwidth, the node load, the link delivery rate, and the link interference, and thus the effect of route selection is optimized greatly. The simulation results show that the proposed CL-OLSR protocol can not only improve the network throughput to a large extent, but also reduce the end-to-end delay, while achieving load balance route results.展开更多
Link asymmetry in wireless mesh access networks(WMAN)of Mobile ad-hoc Networks(MANETs)is due mesh routers’transmission range.It is depicted as significant research challenges that pose during the design of network pro...Link asymmetry in wireless mesh access networks(WMAN)of Mobile ad-hoc Networks(MANETs)is due mesh routers’transmission range.It is depicted as significant research challenges that pose during the design of network protocol in wireless networks.Based on the extensive review,it is noted that the substantial link percentage is symmetric,i.e.,many links are unidirectional.It is identified that the synchronous acknowledgement reliability is higher than the asynchronous message.Therefore,the process of establishing bidirectional link quality through asynchronous beacons underrates the link reliability of asym-metric links.It paves the way to exploit an investigation on asymmetric links to enhance network functions through link estimation.Here,a novel Learning-based Dynamic Tree routing(LDTR)model is proposed to improve network performance and delay.For the evaluation of delay measures,asymmetric link,interference,probability of transmission failure is evaluated.The proportion of energy consumed is used for monitoring energy conditions based on the total energy capacity.This learning model is a productive way for resolving the routing issues over the network model during uncertainty.The asymmetric path is chosen to achieve exploitation and exploration iteratively.The learning-based Dynamic Tree routing model is utilized to resolve the multi-objective routing problem.Here,the simulation is done with MATLAB 2020a simulation environment and path with energy-efficiency and lesser E2E delay is evaluated and compared with existing approaches like the Dyna-Q-network model(DQN),asymmetric MAC model(AMAC),and cooperative asymmetric MAC model(CAMAC)model.The simulation outcomes demonstrate that the anticipated LDTR model attains superior network performance compared to others.The average energy consump-tion is 250 J,packet energy consumption is 6.5 J,PRR is 50 bits/sec,95%PDR,average delay percentage is 20%.展开更多
In order to realize the reduction of equipment cost and the demand of higher capacity, wireless mesh network (WMN) router devices usually have several interfaces and work on multi-channels. Jointing channel allocati...In order to realize the reduction of equipment cost and the demand of higher capacity, wireless mesh network (WMN) router devices usually have several interfaces and work on multi-channels. Jointing channel allocation, interface assignment and routing can efficiently improve the network capacity. This paper presents an efficient channel assignment scheme combined with the multi-radio link quality source routing (MR-LQSR) protocol, which is called channel assignment with MR-LQSR (CA-LQSR). In this scheme, a physical interference model is established: calculated transmission time (CTT) is proposed as the metric of channel assignment, which can reflect the real network environment and channel interference best, and enhanced weighted cumulative expected transmission time (EWCETT) is proposed as the routing metric, which preserves load balancing and bandwidth of links. Meantime, the expression of EWCETT contains the value of CTT, thus the total cost time of channel assignment and routing can be reduced. Simulation results show that our method has advantage of higher throughput, lower end-to-end time delay, and less network cost over some other existing methods.展开更多
This paper reviews multi-channel media access control(MAC) protocols based on IEEE 802.11 in wireless Mesh networks(WMNs).Several key issues in multi-channel IEEE 802.11-based WMNs are introduced and typical solut...This paper reviews multi-channel media access control(MAC) protocols based on IEEE 802.11 in wireless Mesh networks(WMNs).Several key issues in multi-channel IEEE 802.11-based WMNs are introduced and typical solutions proposed in recent years are classified and discussed in detail.The experiments are performed by network simulator version 2(NS2) to evaluate four representative algorithms compared with traditional IEEE 802.11.Simulation results indicate that using multiple channels can substantially improve the performance of WMNs in single-hop scenario and each node equipped with multiple interfaces can substantially improve the performance of WMNs in multi-hop scenario.展开更多
Most existing Ad-hoc routing protocols use the shortest path algorithm with a hop count metric to select paths. It is appropriate in single-rate wireless networks, but has a tendency to select paths containing long-di...Most existing Ad-hoc routing protocols use the shortest path algorithm with a hop count metric to select paths. It is appropriate in single-rate wireless networks, but has a tendency to select paths containing long-distance links that have low data rates and reduced reliability in multi-rate networks. This article introduces a high throughput routing algorithm utilizing the multi-rate capability and some mesh characteristics in wireless fidelity (WiFi) mesh networks. It uses the medium access control (MAC) transmission time as the routing metric, which is estimated by the information passed up from the physical layer. When the proposed algorithm is adopted, the Ad-hoc on-demand distance vector (AODV) routing can be improved as high throughput AODV (HT-AODV). Simulation results show that HT-AODV is capable of establishing a route that has high data-rate, short end-to-end delay and great network throughput.展开更多
The multi-radio multi-channel wireless mesh network (MRMC-WMN) draws general attention because of its excellent throughput performance, robustness and relative low cost. The closed interactions among power control ...The multi-radio multi-channel wireless mesh network (MRMC-WMN) draws general attention because of its excellent throughput performance, robustness and relative low cost. The closed interactions among power control (PC), channel assignment (CA) and routing is contributed to the performance of multi-radio multi-channel wireless mesh networks (MRMC-WMNs). However, the joint PC, CA and routing (JPCR) design, desired to achieve a global optimization, was poor addressed. The authors present a routing algorithm joint with PC and CA (JPCRA) to seek the routing, power and channel scheme for each flow, which can improve the fairness performance. Firstly, considering available channels and power levels, the routing metric, called minimum flow rate, is designed based on the physical interference and Shannon channel models. The JPCRA is presented based on the genetic algorithm (GA) with simulated annealing to maximize the minimum flow rate, an non-deterministic polynomial-time hard (NP-Hard) problem. Simulations show the JPCRA obtains better fairness among different flows and higher network throughput.展开更多
Smart antenna technology is introduced to wireless mesh networks. Smart antennas based wider-range access medium access control (MAC) protocol (SWAMP) is used as MAC protocol for IEEE 802.11 mesh networks in this ...Smart antenna technology is introduced to wireless mesh networks. Smart antennas based wider-range access medium access control (MAC) protocol (SWAMP) is used as MAC protocol for IEEE 802.11 mesh networks in this study. The calculation method of node throughput in chain and arbitrary topology is proposed under nodes fairness guarantee. Network scale and interference among nodes are key factors that influence node throughput. Node distribution pattern near the gateway also affects the node throughput. Experiment based on network simulator-2 (NS-2) simulation platform compares node throughput between smart antenna scenario and omni-antenna scenario. As smart antenna technology reduces the bottle collision domain, node throughput increases observably.展开更多
A Prioritized Medium Access Control (P-MAC) protocol is proposed for wireless routers of mesh networks with quality-of-service provisioning. The simple yet effective design of P-MAC offers strict service differentia...A Prioritized Medium Access Control (P-MAC) protocol is proposed for wireless routers of mesh networks with quality-of-service provisioning. The simple yet effective design of P-MAC offers strict service differentiation for prioritized packets. A Markov model is developed to yield important performance matrices including the packet blocking probability due to queue overflow and the packet reneging probability due to delay bound. It is further proved that the service time of P-MAC approximates exponential distribution, and can be effectively estimated. The analytic models with preemptive and non-preemptive schemes, validated via simulations, show that P-MAC can effectively support traffic differentiation and achieve very low packet dropping (both reneging and blocking) probabilities when the traffic load is below the channel capacity. When the network is overloaded, P-MAC can still maintain extremely stable and high channel throughput. Moreover, it is demonstrated that P-MAC performs superior in multihop networks, further proving the advantages of the proposed protocol.展开更多
Network coding,which exploits the broadcast nature of wireless medium,is an effective way to improve network performance in wireless multi-hop networks,but the first practical wireless network coding system COPE canno...Network coding,which exploits the broadcast nature of wireless medium,is an effective way to improve network performance in wireless multi-hop networks,but the first practical wireless network coding system COPE cannot actively detect a route with more coding opportunities and limit the coding structure within two-hop regions.An on-demand coding-aware routing scheme (OCAR) for wireless Mesh networks is proposed to overcome the limitations specified above by actively detecting a route with more coding opportunities along the entire route rather than within two-hop regions.Utilizing more coding opportunities tends to route multiple flows ‘close to each other’ while avoiding interference requires routing multiple flows ‘away from each other’.OCAR achieves a tradeoff by adopting RC AIA as routing metric in route discovery,which is not only coding-aware but also considers both inter and intra flow interference.Simulation results show that,compared with Ad-hoc on-demand distance vecfor routing (AODV) and AODV+COPE,OCAR can find more coding opportunities,thus effectively increase network throughput,reduce end to end delay and alleviate network congestion.展开更多
WiMAX distributed scheduling can be modeled as two procedures:three-way handshaking procedure and data subframe scheduling procedure.Due to manipulating data transmission directly,data subframe scheduling has a close...WiMAX distributed scheduling can be modeled as two procedures:three-way handshaking procedure and data subframe scheduling procedure.Due to manipulating data transmission directly,data subframe scheduling has a closer relationship with user Quality of Service(QoS) satisfaction,and has more severe impact on network performance,compared with handshaking procedure.A QoS guaranteed Throughput-Efficiency Optimal distributed data subframe Scheduling scheme,named as QoS-TEOS,is proposed.QoS-TEOS achieves QoS guarantee through modeling services into different ranks and assigning them with corresponding priorities.A service with higher priority is scheduled ahead of that with lower priority and offered with high QoS quality.Same kinds of services that request similar QoS quality are classified into one service set.Different service sets are scheduled with different strategies.QoS-TEOS promotes network performance through improving network throughput and efficiency.Theoretical analysis shows that the scheduled data transmission should balance data generation rate from upper layer and transmission rate of physical layer,to avoid network throughput and efficiency declining.Simulation results show that QoS-TEOS works excellently to achieve throughput-efficiency optimization and guarantee a high QoS.展开更多
Performance of wireless mesh networks can be greatly improved by spatial reuse (SR), therefore, lots of algorithms have been proposed to maximize the number of concurrent transmis- sions. However, most methods only ...Performance of wireless mesh networks can be greatly improved by spatial reuse (SR), therefore, lots of algorithms have been proposed to maximize the number of concurrent transmis- sions. However, most methods only considered the interference brought by the sender nodes. In this paper, we study the interfer- ence model in WiMAX mesh networks and propose a minimal SR-pair interference model to perform concurrent transmissions in both uplink and downlink directions. Simulation results show that our model is more efficient and stable, i.e., it increases the number of concurrent transmissions and its performance is constant and independent of transmission directions.展开更多
Capacity analysis is a fundamental and essential work for evaluating the performance of cognitive wireless mesh network (CWMN) which is considered a promising option for the future network. Power control is an effic...Capacity analysis is a fundamental and essential work for evaluating the performance of cognitive wireless mesh network (CWMN) which is considered a promising option for the future network. Power control is an efficient way to avoid interference and improve capacity of wireless mesh networks. In this paper, a quantitative result of the per-node average throughput capacity of CWMN with power control is deduced for the first time, which is much helpful for understanding the limitations of CWMN. Firstly, under the large-scale channel fading model and protocol interference model, a closed-form expression for the maximum channel capacity of each node with power control is presented, under the constraint that the interference tolerated by the primary users (PUs) does not exceed a threshold. And then, with the deduced channel capacity result, the per-node average throughput capacity of CWMN is derived based on two regular topologies, i.e. square topology and triangle topology. The simulation results indicate that the capacity is effectively improved with power control, and affected by topology, tolerated interference threshold, the number of cognitive users (CUs) and primary users (PUs).展开更多
This study proposes an efficient secure routing protocol which considers symmetric and asymmetric links for wireless mesh networks(WMNs). A wireless mesh network is a group of wireless mesh routers and several kinds o...This study proposes an efficient secure routing protocol which considers symmetric and asymmetric links for wireless mesh networks(WMNs). A wireless mesh network is a group of wireless mesh routers and several kinds of wireless devices(or nodes). Individual node cooperates by forwarding packets to each other,allowing nodes to communicate beyond the symmetric or asymmetric links. Asymmetric link is a special feature of WMNs because the wireless transmission ranges of different wireless devices may be different. The asymmetric link enhances WMN coverage. Providing security in WMNs has become an important issue over the last few years. Existing research on this topic tends to focus on providing security for routing and data content in the symmetric link. However, most studies overlook the asymmetric link in these networks. This study proposes a novel distributed routing protocol beyond symmetric and asymmetric links, to guarantee the security and high reliability of the established route in a hostile environment, such as WMNs, by avoiding the use of unreliable intermediate nodes. The routes generated by the proposed protocol are shorter than those in prior works. The major objective of the proposed protocol is to allow trustworthy intermediate nodes to participate in the path construction protocol. The mesh clients out of mesh router wireless transmission range may discover a secure route to securely connect to the mesh router for Internet access via the proposed protocol. The proposed protocol enhances wireless mesh network coverage and assures security.展开更多
文摘The Wireless Mesh Network (WMN) has become a focus in research of wireless broadband communications . In a switching technologies - based wireless Mesh network, the entire network is regarded as an IP subnet, so it cannot be applied in situations where large coverage is required . The use of cooperative relaying technologies can improve the transmission rate and reliability of wireless link; while the wireless Mesh network, once integrated with cooperative relaying technologies and routing technologies , can improve its spectrum efficiency and cover a wide area . However, there are many problems to be solved with respect to standardization, key technologies research and industrialization. Therefore , the application of cooperative relaying technologies in wireless Mesh networks is still a great challenge .
基金Supported by the National High Technology Research and Development Program (No. 2009AA011504)
文摘Cognitive Wireless Mesh Networks(CWMN) is a novel wireless network which combines the advantage of Cognitive Radio(CR) and wireless mesh networks.CWMN can realize seamless in-tegration of heterogeneous wireless networks and achieve better radio resource utilization.However,it is particularly vulnerable due to its features of open medium,dynamic spectrum,dynamic topology,and multi-top routing,etc..Being a dynamic positive security strategy,intrusion detection can provide powerful safeguard to CWMN.In this paper,we introduce trust mechanism into CWMN with intrusion detection and present a trust establishment model based on intrusion detection.Node trust degree and the trust degree of data transmission channels between nodes are defined and an algorithm of calcu-lating trust degree is given based on distributed detection of attack to networks.A channel assignment and routing scheme is proposed,in which selects the trusted nodes and allocates data channel with high trust degree for the transmission between neighbor nodes to establish a trusted route.Simulation re-sults indicate that the scheme can vary channel allocation and routing dynamically according to network security state so as to avoid suspect nodes and unsafe channels,and improve the packet safe delivery fraction effectively.
基金This work was funded by Special Standardization Foundation of the Science and Technology Commission of Shanghai Municipality under Grant 07DZ05018the Natural Science Foundation of Shanghai Municipality under Grant 07ZR14104
文摘The continuous increase of data transmission density in wireless mobile communications has posed a challenge to the system performance of Wireless Mesh Networks (WMNs ). There is a rule for wireless Ad hoc networks that the average node capacity decreases while the number of nodes increases , so it is hard to establish a large - scale wireless Mesh network. Network scalability is very important for enhancing the adaptive networking capability of the wireless Mesh network. This article discusses key scalability technologies for Mesh Base Stations (BSs ) and Mesh Mobile Stations (MSs ), such as channel allocation, intelligent routing , multi- antenna , node classification, Quality of Service (QoS) differentiation and cooperative transmission.
基金Supported by the National Natural Science Foundation of China (No. 60972038)the Jiangsu Province Universities Natural Science Research Key Grant Project (07KJA-51006)+1 种基金the Open Research Fund of National Mobile Communications Research Laboratory, Southeast University (N200911)Jiangsu Province Graduate In-novative Research Plan (CX09B_149Z)
文摘In this paper, we propose an aware-based adaptive opportunistic retransmission control scheme for wireless multimedia Mesh networks. The proposed scheme provides maximum retransmis-sion count optimization based on environment-aware to improve packet relay probability. The scheme discriminates the types of packet loss in wireless link by means of environment information and selects the retransmission count by taking the IEEE 802.11 wireless channel characteristics into consideration. Furthermore, the maximum retransmission count of MAC is adjusted adaptively. Extensive simulations demonstrate that the proposed scheme significantly reduces packet collision probability and packet loss rate, and thus improves network throughput.
基金Supported by the National Natural Science Foundation of China(No.71231004 and No.61004086)
文摘IEEE 802.11 based wireless mesh networks with directional antennas are expected to be a new promising technology and an economic approach for providing wireless broadband services in rural areas.In this paper,we discuss interference models and address how they can affect the design of channel assignment in rural mesh networks.We present a new channel assignment framework based on graph coloring for rural wireless mesh networks.The goal of the framework is to allow synchronously transmitting or receiving data from multiple neighbor links at the same time,and continuously doing full-duplex data transfer on every link,creating an efficient rural mesh network without interference.Channel assignment is shown to be NP-hard.We frame this channel allocation problem in terms of Adjacent Vertex Distinguishing Edge Coloring(AVDEC).Detailed assignment results on grid topology are presented and discussed.Furthermore,we design an algorithm.Finally,we evaluate the performance of the proposed algorithm through extensive simulations and show the algorithm is effective to the regular grid topologies,and the number of colors used by the algorithm is upper bounded by+1.Hence the algorithm guarantees that the number of channels available in standards such as IEEE802.11a is sufficient to have a valid AVDEC for many grid topologies.We also evaluate the proposed algorithm for arbitrary graphs.The algorithm provides a lower upper bound on the minimum number of channels to the AVDEC index channel assignment problem.
文摘Intrusion is any unwanted activity that can disrupt the normal functions of wired or wireless networks. Wireless mesh networking technology has been pivotal in providing an affordable means to deploy a network and allow omnipresent access to users on the Internet. A multitude of emerging public services rely on the widespread, high-speed, and inexpensive connectivity provided by such networks. The absence of a centralized network infrastructure and open shared medium makes WMNs particularly susceptible to malevolent attacks, especially in multihop networks. Hence, it is becoming increasingly important to ensure privacy, security, and resilience when designing such networks. An effective method to detect possible internal and external attack vectors is to use an intrusion detection system. Although many Intrusion Detection Systems (IDSs) were proposed for Wireless Mesh Networks (WMNs), they can only detect intrusions in a particular layer. Because WMNs are vulnerable to multilayer security attacks, a cross-layer IDS are required to detect and respond to such attacks. In this study, we analyzed cross-layer IDS options in WMN environments. The main objective was to understand how such schemes detect security attacks at several OSI layers. The suggested IDS is verified in many scenarios, and the experimental results show its efficiency.
基金This project was supported by the National Natural Science Foundation of China (60573129).
文摘Communication security is a critical aspect of QoS provisioning in wireless mesh network (WMN). Because of the inherent characteristics of WMN, conventional security mechanisms cannot be applied. In order to guarantee the communication security, a novel communication security mechanism is proposed. The mechanism uses a communication encryption scheme to encrypt data packets and employs a risk avoidance scheme to avoid the malicious nodes during communications. Simulation results indicate that the mechanism is able to provide secure communication effectively and reduce the damage of attacks through multiple paths.
基金supported by the Fundamental Research Funds for the Central Universities under Grant No.ZYGX2009j006Foundation of Science & Technology Department of Sichuan Province under Grant No.2011GZ0192
文摘A proactive routing protocol CL-OLSR (cross-layer based optimized link state routing) by using a brand-new routing metric CLM (cross-layer metric) is proposed. CL-OLSR takes into account four link quality impact factors in route calculation through the cross-layer operation mechanism: the node available bandwidth, the node load, the link delivery rate, and the link interference, and thus the effect of route selection is optimized greatly. The simulation results show that the proposed CL-OLSR protocol can not only improve the network throughput to a large extent, but also reduce the end-to-end delay, while achieving load balance route results.
文摘Link asymmetry in wireless mesh access networks(WMAN)of Mobile ad-hoc Networks(MANETs)is due mesh routers’transmission range.It is depicted as significant research challenges that pose during the design of network protocol in wireless networks.Based on the extensive review,it is noted that the substantial link percentage is symmetric,i.e.,many links are unidirectional.It is identified that the synchronous acknowledgement reliability is higher than the asynchronous message.Therefore,the process of establishing bidirectional link quality through asynchronous beacons underrates the link reliability of asym-metric links.It paves the way to exploit an investigation on asymmetric links to enhance network functions through link estimation.Here,a novel Learning-based Dynamic Tree routing(LDTR)model is proposed to improve network performance and delay.For the evaluation of delay measures,asymmetric link,interference,probability of transmission failure is evaluated.The proportion of energy consumed is used for monitoring energy conditions based on the total energy capacity.This learning model is a productive way for resolving the routing issues over the network model during uncertainty.The asymmetric path is chosen to achieve exploitation and exploration iteratively.The learning-based Dynamic Tree routing model is utilized to resolve the multi-objective routing problem.Here,the simulation is done with MATLAB 2020a simulation environment and path with energy-efficiency and lesser E2E delay is evaluated and compared with existing approaches like the Dyna-Q-network model(DQN),asymmetric MAC model(AMAC),and cooperative asymmetric MAC model(CAMAC)model.The simulation outcomes demonstrate that the anticipated LDTR model attains superior network performance compared to others.The average energy consump-tion is 250 J,packet energy consumption is 6.5 J,PRR is 50 bits/sec,95%PDR,average delay percentage is 20%.
基金supported by the Fundamental Research Funds for the Central Universities (2009RC0308)
文摘In order to realize the reduction of equipment cost and the demand of higher capacity, wireless mesh network (WMN) router devices usually have several interfaces and work on multi-channels. Jointing channel allocation, interface assignment and routing can efficiently improve the network capacity. This paper presents an efficient channel assignment scheme combined with the multi-radio link quality source routing (MR-LQSR) protocol, which is called channel assignment with MR-LQSR (CA-LQSR). In this scheme, a physical interference model is established: calculated transmission time (CTT) is proposed as the metric of channel assignment, which can reflect the real network environment and channel interference best, and enhanced weighted cumulative expected transmission time (EWCETT) is proposed as the routing metric, which preserves load balancing and bandwidth of links. Meantime, the expression of EWCETT contains the value of CTT, thus the total cost time of channel assignment and routing can be reduced. Simulation results show that our method has advantage of higher throughput, lower end-to-end time delay, and less network cost over some other existing methods.
基金supported by the International Scientific and Technological Cooperation Program (S2010GR0902)the Chongqing Municipal Excellent Talents (2010)+1 种基金the Scientific Research Fund of Municipal Education Commission of Chongqing (KJ080507)the Natural Science Foundation of Chongqing University of Posts and Telecommunications (A2009-53)
文摘This paper reviews multi-channel media access control(MAC) protocols based on IEEE 802.11 in wireless Mesh networks(WMNs).Several key issues in multi-channel IEEE 802.11-based WMNs are introduced and typical solutions proposed in recent years are classified and discussed in detail.The experiments are performed by network simulator version 2(NS2) to evaluate four representative algorithms compared with traditional IEEE 802.11.Simulation results indicate that using multiple channels can substantially improve the performance of WMNs in single-hop scenario and each node equipped with multiple interfaces can substantially improve the performance of WMNs in multi-hop scenario.
基金the National Natural Science Foundation of China (60572119), Ericsson Company
文摘Most existing Ad-hoc routing protocols use the shortest path algorithm with a hop count metric to select paths. It is appropriate in single-rate wireless networks, but has a tendency to select paths containing long-distance links that have low data rates and reduced reliability in multi-rate networks. This article introduces a high throughput routing algorithm utilizing the multi-rate capability and some mesh characteristics in wireless fidelity (WiFi) mesh networks. It uses the medium access control (MAC) transmission time as the routing metric, which is estimated by the information passed up from the physical layer. When the proposed algorithm is adopted, the Ad-hoc on-demand distance vector (AODV) routing can be improved as high throughput AODV (HT-AODV). Simulation results show that HT-AODV is capable of establishing a route that has high data-rate, short end-to-end delay and great network throughput.
基金supported by the National Science and Technology Major Project of (2012ZX03003001-004)the Beijing Higher Education Young Elite Teacher Projectthe National Natural Science Foundation of China (61272516, 61272518 and 61302083)
文摘The multi-radio multi-channel wireless mesh network (MRMC-WMN) draws general attention because of its excellent throughput performance, robustness and relative low cost. The closed interactions among power control (PC), channel assignment (CA) and routing is contributed to the performance of multi-radio multi-channel wireless mesh networks (MRMC-WMNs). However, the joint PC, CA and routing (JPCR) design, desired to achieve a global optimization, was poor addressed. The authors present a routing algorithm joint with PC and CA (JPCRA) to seek the routing, power and channel scheme for each flow, which can improve the fairness performance. Firstly, considering available channels and power levels, the routing metric, called minimum flow rate, is designed based on the physical interference and Shannon channel models. The JPCRA is presented based on the genetic algorithm (GA) with simulated annealing to maximize the minimum flow rate, an non-deterministic polynomial-time hard (NP-Hard) problem. Simulations show the JPCRA obtains better fairness among different flows and higher network throughput.
文摘Smart antenna technology is introduced to wireless mesh networks. Smart antennas based wider-range access medium access control (MAC) protocol (SWAMP) is used as MAC protocol for IEEE 802.11 mesh networks in this study. The calculation method of node throughput in chain and arbitrary topology is proposed under nodes fairness guarantee. Network scale and interference among nodes are key factors that influence node throughput. Node distribution pattern near the gateway also affects the node throughput. Experiment based on network simulator-2 (NS-2) simulation platform compares node throughput between smart antenna scenario and omni-antenna scenario. As smart antenna technology reduces the bottle collision domain, node throughput increases observably.
基金Supported in part by the National Science Foundation CAREER Award (No. CNS-0347686)US Department of Energy (DoE) (No. DE-FG02-04ER46136)
文摘A Prioritized Medium Access Control (P-MAC) protocol is proposed for wireless routers of mesh networks with quality-of-service provisioning. The simple yet effective design of P-MAC offers strict service differentiation for prioritized packets. A Markov model is developed to yield important performance matrices including the packet blocking probability due to queue overflow and the packet reneging probability due to delay bound. It is further proved that the service time of P-MAC approximates exponential distribution, and can be effectively estimated. The analytic models with preemptive and non-preemptive schemes, validated via simulations, show that P-MAC can effectively support traffic differentiation and achieve very low packet dropping (both reneging and blocking) probabilities when the traffic load is below the channel capacity. When the network is overloaded, P-MAC can still maintain extremely stable and high channel throughput. Moreover, it is demonstrated that P-MAC performs superior in multihop networks, further proving the advantages of the proposed protocol.
基金supported by the National Natural Science Foundation of China (60902049,60873190)the Hi-Tech Research and Development Program of China (2008AA01Z211)
文摘Network coding,which exploits the broadcast nature of wireless medium,is an effective way to improve network performance in wireless multi-hop networks,but the first practical wireless network coding system COPE cannot actively detect a route with more coding opportunities and limit the coding structure within two-hop regions.An on-demand coding-aware routing scheme (OCAR) for wireless Mesh networks is proposed to overcome the limitations specified above by actively detecting a route with more coding opportunities along the entire route rather than within two-hop regions.Utilizing more coding opportunities tends to route multiple flows ‘close to each other’ while avoiding interference requires routing multiple flows ‘away from each other’.OCAR achieves a tradeoff by adopting RC AIA as routing metric in route discovery,which is not only coding-aware but also considers both inter and intra flow interference.Simulation results show that,compared with Ad-hoc on-demand distance vecfor routing (AODV) and AODV+COPE,OCAR can find more coding opportunities,thus effectively increase network throughput,reduce end to end delay and alleviate network congestion.
基金Supported by Intel Project under Grant No.4507336215Huawei Project under Grant No.YBCB2007025the University of Science and Technology of China Innovation Foundation under Grant No.KD2008053.
文摘WiMAX distributed scheduling can be modeled as two procedures:three-way handshaking procedure and data subframe scheduling procedure.Due to manipulating data transmission directly,data subframe scheduling has a closer relationship with user Quality of Service(QoS) satisfaction,and has more severe impact on network performance,compared with handshaking procedure.A QoS guaranteed Throughput-Efficiency Optimal distributed data subframe Scheduling scheme,named as QoS-TEOS,is proposed.QoS-TEOS achieves QoS guarantee through modeling services into different ranks and assigning them with corresponding priorities.A service with higher priority is scheduled ahead of that with lower priority and offered with high QoS quality.Same kinds of services that request similar QoS quality are classified into one service set.Different service sets are scheduled with different strategies.QoS-TEOS promotes network performance through improving network throughput and efficiency.Theoretical analysis shows that the scheduled data transmission should balance data generation rate from upper layer and transmission rate of physical layer,to avoid network throughput and efficiency declining.Simulation results show that QoS-TEOS works excellently to achieve throughput-efficiency optimization and guarantee a high QoS.
基金Supported by the National Natural Science Foundation of China (60672051)
文摘Performance of wireless mesh networks can be greatly improved by spatial reuse (SR), therefore, lots of algorithms have been proposed to maximize the number of concurrent transmis- sions. However, most methods only considered the interference brought by the sender nodes. In this paper, we study the interfer- ence model in WiMAX mesh networks and propose a minimal SR-pair interference model to perform concurrent transmissions in both uplink and downlink directions. Simulation results show that our model is more efficient and stable, i.e., it increases the number of concurrent transmissions and its performance is constant and independent of transmission directions.
基金supported by the National Science & Technology Major Project of 2011ZX03001-005-02the National Natural Science Foundation of China (61272516, 61272518, 61170275)the China-Canada Project (2010DFA111320)
文摘Capacity analysis is a fundamental and essential work for evaluating the performance of cognitive wireless mesh network (CWMN) which is considered a promising option for the future network. Power control is an efficient way to avoid interference and improve capacity of wireless mesh networks. In this paper, a quantitative result of the per-node average throughput capacity of CWMN with power control is deduced for the first time, which is much helpful for understanding the limitations of CWMN. Firstly, under the large-scale channel fading model and protocol interference model, a closed-form expression for the maximum channel capacity of each node with power control is presented, under the constraint that the interference tolerated by the primary users (PUs) does not exceed a threshold. And then, with the deduced channel capacity result, the per-node average throughput capacity of CWMN is derived based on two regular topologies, i.e. square topology and triangle topology. The simulation results indicate that the capacity is effectively improved with power control, and affected by topology, tolerated interference threshold, the number of cognitive users (CUs) and primary users (PUs).
文摘This study proposes an efficient secure routing protocol which considers symmetric and asymmetric links for wireless mesh networks(WMNs). A wireless mesh network is a group of wireless mesh routers and several kinds of wireless devices(or nodes). Individual node cooperates by forwarding packets to each other,allowing nodes to communicate beyond the symmetric or asymmetric links. Asymmetric link is a special feature of WMNs because the wireless transmission ranges of different wireless devices may be different. The asymmetric link enhances WMN coverage. Providing security in WMNs has become an important issue over the last few years. Existing research on this topic tends to focus on providing security for routing and data content in the symmetric link. However, most studies overlook the asymmetric link in these networks. This study proposes a novel distributed routing protocol beyond symmetric and asymmetric links, to guarantee the security and high reliability of the established route in a hostile environment, such as WMNs, by avoiding the use of unreliable intermediate nodes. The routes generated by the proposed protocol are shorter than those in prior works. The major objective of the proposed protocol is to allow trustworthy intermediate nodes to participate in the path construction protocol. The mesh clients out of mesh router wireless transmission range may discover a secure route to securely connect to the mesh router for Internet access via the proposed protocol. The proposed protocol enhances wireless mesh network coverage and assures security.