The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(...The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(IPv6)in the IoT.However,RPL is vulnerable to various attacks,including the sinkhole attack,which disrupts the network by manipulating routing information.This paper proposes the Unweighted Voting Method(UVM)for sinkhole node identification,utilizing three key behavioral indicators:DODAG Information Object(DIO)Transaction Frequency,Rank Harmony,and Power Consumption.These indicators have been carefully selected based on their contribution to sinkhole attack detection and other relevant features used in previous research.The UVM method employs an unweighted voting mechanism,where each voter or rule holds equal weight in detecting the presence of a sinkhole attack based on the proposed indicators.The effectiveness of the UVM method is evaluated using the COOJA simulator and compared with existing approaches.Notably,the proposed approach fulfills power consumption requirements for constrained nodes without increasing consumption due to the deployment design.In terms of detection accuracy,simulation results demonstrate a high detection rate ranging from 90%to 100%,with a low false-positive rate of 0%to 0.2%.Consequently,the proposed approach surpasses Ensemble Learning Intrusion Detection Systems by leveraging three indicators and three supporting rules.展开更多
An important vision of next generation mobile system is to provide global internet access.The Space-Terrestrial Integrated Network(STIN)has been proposed and intensively studied to tackle this challenge.Due to the sev...An important vision of next generation mobile system is to provide global internet access.The Space-Terrestrial Integrated Network(STIN)has been proposed and intensively studied to tackle this challenge.Due to the severe attenuation of radio signals in water,the STIN cannot be directly applied in underwater scenarios.In this paper we envision a framework of integrated radio-acoustic network arming at high-efficient data transmission in underwater scenarios,where acoustic signal is for underwater communication and radio signal is for surface and air communications.Since radio links have much higher data transmission rate and lower delay,in the integrated radio-acoustic network,the acoustic links easily become congested,at the same time the radio links are not fully utilized.We therefore propose that the integrated radio-acoustic network should be properly designed to minimize the hop count of acoustic links,as well as the signaling overhead in the acoustic subnetwork.We then present a novel network framework and the relative technologies to help moving the signaling overhead to the radio subnetwork.展开更多
This paper presents a hierarchical dynamic routing protocol (HDRP) based on the discrete dynamic programming principle. The proposed protocol can adapt to the dynamic and large computer networks (DLCN) with clustering...This paper presents a hierarchical dynamic routing protocol (HDRP) based on the discrete dynamic programming principle. The proposed protocol can adapt to the dynamic and large computer networks (DLCN) with clustering topology. The procedures for realizing routing update and decision are presented in this paper. The proof of correctness and complexity analysis of the protocol are also made. The performance measures of the HDRP including throughput and average message delay are evaluated by using of simulation. The study shows that the HDRP provides a new available approach to the routing decision for DLCN or high speed networks with clustering topology.展开更多
For wireless ad hoc networks simulation, node's mobility pattern and traffic pattern are two key elements. A new simulation model is presented based on the virtual reality collision detection algorithm in obstacle en...For wireless ad hoc networks simulation, node's mobility pattern and traffic pattern are two key elements. A new simulation model is presented based on the virtual reality collision detection algorithm in obstacle environment, and the model uses the path planning method to avoid obstacles and to compute the node's moving path. Obstacles also affect node's signal propagation. Considering these factors, this study implements the mobility model for wireless ad hoc networks. Simulation results show that the model has a significant impact on the performance of protocols.展开更多
Embedded computing device implementation on the Internet of Things (IoT) requires careful assessment of their intrinsic resource limitations. These constraints are not limited to memory and processing capabilities but...Embedded computing device implementation on the Internet of Things (IoT) requires careful assessment of their intrinsic resource limitations. These constraints are not limited to memory and processing capabilities but extend to the network interfaces, particularly due to the low-power radio standards that these devices typically employ. The IPv6 protocol is shown to be a strong option for guaranteeing interoperability in the IoT, mostly because of its large address space, the range of current IP-based protocols, and its intrinsic versatility. Considering these benefits, we investigate if current IP-based network management protocols can be implemented on devices with limited resources. We investigate the resource needs in particular for implementing Network Configuration Protocol (NETCONF) and Simple Network Management Protocol (SNMP) on an 8-bit AVR-based device. Our investigation reveals the specific memory and processing demands of these protocols, providing valuable insights into their practicality and efficiency in constrained IoT environments. This study underscores the potential and challenges of leveraging IPv6-based network management protocols to enhance the functionality and interoperability of IoT devices while operating within stringent resource limitations.展开更多
Secure key distribution among classical parties is impossible both between two parties and in a network. In this paper, we present a quantum key distribution (QKD) protocol to distribute secure key bits among one qu...Secure key distribution among classical parties is impossible both between two parties and in a network. In this paper, we present a quantum key distribution (QKD) protocol to distribute secure key bits among one quantum party and numerous classical parties who have no quantum capacity. We prove that our protocol is completely robust, i.e., any eavesdropping attack should be detected with nonzero probability. Our calculations show that our protocol may be secure against Eve's symmetrically individual attack.展开更多
Cyberattacks on the Industrial Control System(ICS)have recently been increasing,made more intelligent by advancing technologies.As such,cybersecurity for such systems is attracting attention.As a core element of contr...Cyberattacks on the Industrial Control System(ICS)have recently been increasing,made more intelligent by advancing technologies.As such,cybersecurity for such systems is attracting attention.As a core element of control devices,the Programmable Logic Controller(PLC)in an ICS carries out on-site control over the ICS.A cyberattack on the PLC will cause damages on the overall ICS,with Stuxnet and Duqu as the most representative cases.Thus,cybersecurity for PLCs is considered essential,and many researchers carry out a variety of analyses on the vulnerabilities of PLCs as part of preemptive efforts against attacks.In this study,a vulnerability analysis was conducted on the XGB PLC.Security vulnerabilities were identified by analyzing the network protocols and memory structure of PLCs and were utilized to launch replay attack,memory modulation attack,and FTP/Web service account theft for the verification of the results.Based on the results,the attacks were proven to be able to cause the PLC to malfunction and disable it,and the identified vulnerabilities were defined.展开更多
A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node ag...A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node agents. Considering the resource limitations on the sensor nodes, we design new management messages, new data types and new management information base completely. The management messages between the cluster proxy and node agents are delivered as normal data packets. The experiment results show that LW-SNMP can meet the management demands in the resource-limited wireless sensor networks and has a good performance in stability, effectiveness of memory, extensibility than the traditional Simple Network Management Protocol (SNMP).展开更多
Sensor networks tend to support different traffic patterns since more and more emerging applications have diverse needs. We present MGRP, a Multi-Gradient Routing Protocol for wireless sensor networks, which is fully ...Sensor networks tend to support different traffic patterns since more and more emerging applications have diverse needs. We present MGRP, a Multi-Gradient Routing Protocol for wireless sensor networks, which is fully distributed and efficiently supports endto-end, one-to-many and many-to-one traffic patterns by effectively construct and maintain a gradient vector for each node. We further combine neighbor link estimation with routing information to reduce packet exchange on network dynamics and node failures. We have implemented MGRP on Tiny OS and evaluated its performance on real-world testbeds. The result shows MGRP achieves lower end-to-end packet delay in different traffic patterns compared to the state of the art routing protocols while still remains high packet delivery ratio.展开更多
In this paper, we propose and evaluate outage performance of a mixed amplify-and-forward(AF) and decode-and-forward(DF) relaying protocol in underlay cognitive radio. Different from the conventional AF and DF protocol...In this paper, we propose and evaluate outage performance of a mixed amplify-and-forward(AF) and decode-and-forward(DF) relaying protocol in underlay cognitive radio. Different from the conventional AF and DF protocols, in the proposed protocol, a secondary source attempts to transmit its signal to a secondary destination with help of two secondary relays. One secondary relay always operates in AF mode, while the remaining one always operates in DF mode. Moreover, we also propose a relay selection method, which relies on the decoding status at the DF relay. For performance evaluation and comparison, we derive the exact and approximate closedform expressions of the outage probability for the proposed protocol over Rayleigh fading channel. Finally, we run Monte Carlo simulations to verify the derivations. Results presented that the proposed protocol obtains a diversity order of three and the outage performance of our scheme is between that of the conventional underlay DF protocol and that of the conventional underlay AF protocol.展开更多
Medium access control( MAC) protocol of underwater acoustic communication network is a key technology for underwater acoustic networks( UANs). Most of the MAC protocols for wireless terrestrial communication networks ...Medium access control( MAC) protocol of underwater acoustic communication network is a key technology for underwater acoustic networks( UANs). Most of the MAC protocols for wireless terrestrial communication networks have been designed with negligible propagation delay. If it is deployed directly in an underwater environment,the UANs will perform inefficiently. In this paper,the characteristics of underwater acoustic channel are modeled and simulated by using the OPNET simulation tool,which are the speed of sound, propagation loss, and four sources for ambient noise: the turbulence,shipping,wind driven waves and thermal noise. The performance of pure Aloha( P-Aloha),carrier sense multiple access with collision avoidance( CSMA / CA) and multiple access collision avoidance for wireless local area network( MACAW) protocols in underwater acoustic channel environment are evaluated. The different performance of protocols in underwater environment is compared in the simulation.展开更多
Two significant issues in Internet-based networked control systems ( INCSs), transport performance of different protocols and security breach from Internet side, are investigated. First, for improving the performanc...Two significant issues in Internet-based networked control systems ( INCSs), transport performance of different protocols and security breach from Internet side, are investigated. First, for improving the performance of data transmission, user datagram protocol (UDP) is adopted as the main stand for controllers and plants using INCSs. Second, a dual-channel secure transmission scheme (DCSTS)based on data transmission characteristics of INCSs is proposed, in which a raw UDP channel and a secure TCP (transmission control protocol) connection making use of SSL/TLS (secure sockets layer/transport layer security) are included. Further, a networked control protocol (NCP) at application layer for supporting DCSTS between the controllers and plants in INCSs is designed, and it also aims at providing a universal communication mechanism for interoperability of devices among the networked control laboratories in Beijing Institute of Technology of China, Central South University of China and Tokyo University of Technology of Japan. By means of a networked single-degree-of-free- dom robot arm, an INCS under the new protocol and security environment is created. Compared with systems such as IPSec or SSL/TLS, which may cause more than 91% network throughput deduction, the new DCSTS protocol may yield results ten times better, being just 5.67%.展开更多
With the advances in enterprise communication and web technologies, web has evolved into a platform for delivering interactive applications. Web-based applications are revolutionizing both the features that can be del...With the advances in enterprise communication and web technologies, web has evolved into a platform for delivering interactive applications. Web-based applications are revolutionizing both the features that can be delivered and the technologies for developing and deploying applications. In this paper, we present a web-based load-adaptive network management system framework. Our system is scalable, extendable, modular and based on open architecture. It is also load-adaptive as it can adapt to the increase in the number of incoming Web Service requests so that the systems performance will not degrade under heavy request loads. To evaluate the proposed architecture, we built a multi-tiered web application testbed with open-source components widely used in industry. Experimental studies conducted on the testbed demonstrated the effectiveness of the proposed approach. By developing the platform and making it available to the research community, we hope to catalyze the development of an open source stack for Web-based network management and monitoring.展开更多
Energy efficiency is the primary issue for the Medium Access Control (MAC) protocol in sensor networks. Adopting periodic sleep,adaptive listen,overhearing avoidance and message passing mechanisms,the Sensor Medium Ac...Energy efficiency is the primary issue for the Medium Access Control (MAC) protocol in sensor networks. Adopting periodic sleep,adaptive listen,overhearing avoidance and message passing mechanisms,the Sensor Medium Access Control (S-MAC) protocol improves energy efficiency and latency in the network. There are mainly two methods to enhance the S-MAC protocol: dynamic adjustment,and sending control and data packets under different transport conditions. For the wireless sensor network,it is not realistic to design one MAC protocol that meets all requirements of every aspect; however,it is possible to design corresponding protocols in accordance with different requirements by flexibly adopting different methods.展开更多
In a Wireless Mesh Network(WMN),the convenience of a routing strategy strongly depends on the mobility of the intermediate nodes that compose the paths.Taking this behaviour into account,this paper presents a routing ...In a Wireless Mesh Network(WMN),the convenience of a routing strategy strongly depends on the mobility of the intermediate nodes that compose the paths.Taking this behaviour into account,this paper presents a routing scheme that works differently accordingly to the node mobility.In this sense,a proactive routing scheme is restricted to the backbone to promote the use of stable routes.Conversely,the reactive protocol is used for searching routes to or from a mobile destination.Both approaches are simultaneously implemented in the mesh nodes so that the routing protocols share routing information that optimises the network performance.Aimed at guaranteeing the IP compatibility,the combination of the two protocols in the core routers is carried out in the Medium Access Control(MAC)layer.In contrast to the operation in the IP layer where two routing protocols cannot work concurrently,the transfer of the routing tasks to the MAC layer enables the use of multiple independent forwarding tables.Simulation results show the advantage of the proposal in terms of packet losses and data delay.展开更多
Based on a media access and control(MAC)protocol,an arrangement of channels and transceivers in optical packet switching dense wavelength division multiplexing(DWDM)networks is proposed in this paper.In order to r...Based on a media access and control(MAC)protocol,an arrangement of channels and transceivers in optical packet switching dense wavelength division multiplexing(DWDM)networks is proposed in this paper.In order to reduce the cost of nodes,fixed transmitters and receivers are used instead of tunable transmitters and receivers.Two fixed transmitters and many fixed receivers are used in each node in the scheme.The average waiting delay of this scheme is analyzed through mathematics and computer simulation.The result shows that the property of the scheme is almost the same as using tunable transmitter and receiver.Furthermore,if the tuning time of tunable transmitters is taken into account,the performance of the tunable transmitter scheme is poor than this scheme at the average waiting delay and throughput of the network.展开更多
The adoption of Internet of Things(IoT)sensing devices is growing rapidly due to their ability to provide realtime services.However,it is constrained by limited data storage and processing power.It offloads its massiv...The adoption of Internet of Things(IoT)sensing devices is growing rapidly due to their ability to provide realtime services.However,it is constrained by limited data storage and processing power.It offloads its massive data stream to edge devices and the cloud for adequate storage and processing.This further leads to the challenges of data outliers,data redundancies,and cloud resource load balancing that would affect the execution and outcome of data streams.This paper presents a review of existing analytics algorithms deployed on IoT-enabled edge cloud infrastructure that resolved the challenges of data outliers,data redundancies,and cloud resource load balancing.The review highlights the problems solved,the results,the weaknesses of the existing algorithms,and the physical and virtual cloud storage servers for resource load balancing.In addition,it discusses the adoption of network protocols that govern the interaction between the three-layer architecture of IoT sensing devices enabled edge cloud and its prevailing challenges.A total of 72 algorithms covering the categories of classification,regression,clustering,deep learning,and optimization have been reviewed.The classification approach has been widely adopted to solve the problem of redundant data,while clustering and optimization approaches are more used for outlier detection and cloud resource allocation.展开更多
This paper describes how to use medium access control (MAC) isolation to enhance management performance in public wireless LAN (PWLAN). To comply with the IEEE 802.11 standards, a scheme to implement MAC isolation in ...This paper describes how to use medium access control (MAC) isolation to enhance management performance in public wireless LAN (PWLAN). To comply with the IEEE 802.11 standards, a scheme to implement MAC isolation in WLAN access points by re-designing the Distribution_Service component of the MAC state machine is proposed. A variable named dotl 1 Isolation is defined to determine whether the MAC level communication between wireless stations in the same BSS is permitted or not. Finally, a design solution based on MPC860 hardware and embedded Linux software for PWLAN access point is specified. The simulation results of MAC isolation for PWLAN show that the proposed scheme is feasible and effective.展开更多
A reasonable parameter configuration helps improve the data transmission performance of the Licklider Transmission Protocol(LTP).Previous research has focused mainly on parameter optimization for LTP in simplified sce...A reasonable parameter configuration helps improve the data transmission performance of the Licklider Transmission Protocol(LTP).Previous research has focused mainly on parameter optimization for LTP in simplified scenarios with one to two hops or multihop scenarios with a custody mechanism of the Bundle Protocol(BP).However,the research results are not applicable to communications in Complex Deep Space Networks(CDSNs)without the custody mechanism of BP that are more suitable for deep space communications with LTP.In this paper,we propose a model of file delivery time for LTP in CDSNs.Based on the model,we propose a Parameter Optimization Design Algorithm for LTP(LTP-PODA)of configuring reasonable parameters for LTP.The results show that the accuracy of the proposed model is at least 6.47%higher than that of the previously established models based on simple scenarios,and the proposed model is more suitable for CDSNs.Moreover,the LTP parameters are optimized by the LTP-PODA algorithm to obtain an optimization plan.Configuring the optimization plan for LTP improves the protocol transmission performance by at least 18.77%compared with configuring the other parameter configuration plans.展开更多
Wireless sensor networks (WSNs) are important application for safety monitoring in underground coal mines, which are difficult to monitor due to natural conditions. Based on the characteristic of limited energy for WS...Wireless sensor networks (WSNs) are important application for safety monitoring in underground coal mines, which are difficult to monitor due to natural conditions. Based on the characteristic of limited energy for WSNs in confined underground area such as coal face and laneway, we presents an energy- efficient clustering routing protocol based on weight (ECRPW) to prolong the lifetime of networks. ECRPW takes into consideration the nodes' residual energy during the election process of cluster heads. The constraint of distance threshold is used to optimize cluster scheme. Furthermore, the protocol also sets up a routing tree based on cluster heads' weight. The results show that ECRPW had better perfor- mance in energy consumption, death ratio of node and network lifetime.展开更多
基金funded by the Deanship of Scientific Research at Najran University for this research through a Grant(NU/RG/SERC/12/50)under the Research Groups at Najran University,Saudi Arabia.
文摘The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(IPv6)in the IoT.However,RPL is vulnerable to various attacks,including the sinkhole attack,which disrupts the network by manipulating routing information.This paper proposes the Unweighted Voting Method(UVM)for sinkhole node identification,utilizing three key behavioral indicators:DODAG Information Object(DIO)Transaction Frequency,Rank Harmony,and Power Consumption.These indicators have been carefully selected based on their contribution to sinkhole attack detection and other relevant features used in previous research.The UVM method employs an unweighted voting mechanism,where each voter or rule holds equal weight in detecting the presence of a sinkhole attack based on the proposed indicators.The effectiveness of the UVM method is evaluated using the COOJA simulator and compared with existing approaches.Notably,the proposed approach fulfills power consumption requirements for constrained nodes without increasing consumption due to the deployment design.In terms of detection accuracy,simulation results demonstrate a high detection rate ranging from 90%to 100%,with a low false-positive rate of 0%to 0.2%.Consequently,the proposed approach surpasses Ensemble Learning Intrusion Detection Systems by leveraging three indicators and three supporting rules.
基金the National Key Research and Development Program of China under grant 2020YFB1807700the National Natural Science Foundation of China under Grants U1701265,U1809211Key Program of Marine Economy Development,Department of Natural Resources of Guangdong Province under Grant YZRZH[2020]009。
文摘An important vision of next generation mobile system is to provide global internet access.The Space-Terrestrial Integrated Network(STIN)has been proposed and intensively studied to tackle this challenge.Due to the severe attenuation of radio signals in water,the STIN cannot be directly applied in underwater scenarios.In this paper we envision a framework of integrated radio-acoustic network arming at high-efficient data transmission in underwater scenarios,where acoustic signal is for underwater communication and radio signal is for surface and air communications.Since radio links have much higher data transmission rate and lower delay,in the integrated radio-acoustic network,the acoustic links easily become congested,at the same time the radio links are not fully utilized.We therefore propose that the integrated radio-acoustic network should be properly designed to minimize the hop count of acoustic links,as well as the signaling overhead in the acoustic subnetwork.We then present a novel network framework and the relative technologies to help moving the signaling overhead to the radio subnetwork.
文摘This paper presents a hierarchical dynamic routing protocol (HDRP) based on the discrete dynamic programming principle. The proposed protocol can adapt to the dynamic and large computer networks (DLCN) with clustering topology. The procedures for realizing routing update and decision are presented in this paper. The proof of correctness and complexity analysis of the protocol are also made. The performance measures of the HDRP including throughput and average message delay are evaluated by using of simulation. The study shows that the HDRP provides a new available approach to the routing decision for DLCN or high speed networks with clustering topology.
文摘For wireless ad hoc networks simulation, node's mobility pattern and traffic pattern are two key elements. A new simulation model is presented based on the virtual reality collision detection algorithm in obstacle environment, and the model uses the path planning method to avoid obstacles and to compute the node's moving path. Obstacles also affect node's signal propagation. Considering these factors, this study implements the mobility model for wireless ad hoc networks. Simulation results show that the model has a significant impact on the performance of protocols.
文摘Embedded computing device implementation on the Internet of Things (IoT) requires careful assessment of their intrinsic resource limitations. These constraints are not limited to memory and processing capabilities but extend to the network interfaces, particularly due to the low-power radio standards that these devices typically employ. The IPv6 protocol is shown to be a strong option for guaranteeing interoperability in the IoT, mostly because of its large address space, the range of current IP-based protocols, and its intrinsic versatility. Considering these benefits, we investigate if current IP-based network management protocols can be implemented on devices with limited resources. We investigate the resource needs in particular for implementing Network Configuration Protocol (NETCONF) and Simple Network Management Protocol (SNMP) on an 8-bit AVR-based device. Our investigation reveals the specific memory and processing demands of these protocols, providing valuable insights into their practicality and efficiency in constrained IoT environments. This study underscores the potential and challenges of leveraging IPv6-based network management protocols to enhance the functionality and interoperability of IoT devices while operating within stringent resource limitations.
基金Project supported by the National Natural Science Foundation of China (Grant No 10774039)
文摘Secure key distribution among classical parties is impossible both between two parties and in a network. In this paper, we present a quantum key distribution (QKD) protocol to distribute secure key bits among one quantum party and numerous classical parties who have no quantum capacity. We prove that our protocol is completely robust, i.e., any eavesdropping attack should be detected with nonzero probability. Our calculations show that our protocol may be secure against Eve's symmetrically individual attack.
基金This work was supported by the National Research Foundation of Korea(NRF)grant funded by the Korea government(MSIT:Ministry of Science and ICT)(Nos.NRF-2016M2A8A4952280 and NRF-2020R1A2C1012187).
文摘Cyberattacks on the Industrial Control System(ICS)have recently been increasing,made more intelligent by advancing technologies.As such,cybersecurity for such systems is attracting attention.As a core element of control devices,the Programmable Logic Controller(PLC)in an ICS carries out on-site control over the ICS.A cyberattack on the PLC will cause damages on the overall ICS,with Stuxnet and Duqu as the most representative cases.Thus,cybersecurity for PLCs is considered essential,and many researchers carry out a variety of analyses on the vulnerabilities of PLCs as part of preemptive efforts against attacks.In this study,a vulnerability analysis was conducted on the XGB PLC.Security vulnerabilities were identified by analyzing the network protocols and memory structure of PLCs and were utilized to launch replay attack,memory modulation attack,and FTP/Web service account theft for the verification of the results.Based on the results,the attacks were proven to be able to cause the PLC to malfunction and disable it,and the identified vulnerabilities were defined.
基金supported by the Fundamental Research Funds for the Central Universities under grant No.2009JBM007supported by the National Natural Science Foundation of China under Grants No. 60802016, 60833002 and 60972010
文摘A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node agents. Considering the resource limitations on the sensor nodes, we design new management messages, new data types and new management information base completely. The management messages between the cluster proxy and node agents are delivered as normal data packets. The experiment results show that LW-SNMP can meet the management demands in the resource-limited wireless sensor networks and has a good performance in stability, effectiveness of memory, extensibility than the traditional Simple Network Management Protocol (SNMP).
基金supported by National Key Technologies Research and Development Program of China under Grant No.2014BAH14F01National Science and Technology Major Project of China under Grant No.2012ZX03005007+1 种基金National NSF of China Grant No.61402372Fundamental Research Funds for the Central Universities Grant No.3102014JSJ0003
文摘Sensor networks tend to support different traffic patterns since more and more emerging applications have diverse needs. We present MGRP, a Multi-Gradient Routing Protocol for wireless sensor networks, which is fully distributed and efficiently supports endto-end, one-to-many and many-to-one traffic patterns by effectively construct and maintain a gradient vector for each node. We further combine neighbor link estimation with routing information to reduce packet exchange on network dynamics and node failures. We have implemented MGRP on Tiny OS and evaluated its performance on real-world testbeds. The result shows MGRP achieves lower end-to-end packet delay in different traffic patterns compared to the state of the art routing protocols while still remains high packet delivery ratio.
基金supported by the 2016 research fund of University of Ulsan
文摘In this paper, we propose and evaluate outage performance of a mixed amplify-and-forward(AF) and decode-and-forward(DF) relaying protocol in underlay cognitive radio. Different from the conventional AF and DF protocols, in the proposed protocol, a secondary source attempts to transmit its signal to a secondary destination with help of two secondary relays. One secondary relay always operates in AF mode, while the remaining one always operates in DF mode. Moreover, we also propose a relay selection method, which relies on the decoding status at the DF relay. For performance evaluation and comparison, we derive the exact and approximate closedform expressions of the outage probability for the proposed protocol over Rayleigh fading channel. Finally, we run Monte Carlo simulations to verify the derivations. Results presented that the proposed protocol obtains a diversity order of three and the outage performance of our scheme is between that of the conventional underlay DF protocol and that of the conventional underlay AF protocol.
基金National Natural Science Foundations of China(Nos.60872073,6097501,and 51075068)the Doctoral Fund of Ministry of Education of China(No.20110092130004)the Research Foundation and Education Bureau of Anhui Province of China(No.KJ2009B137)
文摘Medium access control( MAC) protocol of underwater acoustic communication network is a key technology for underwater acoustic networks( UANs). Most of the MAC protocols for wireless terrestrial communication networks have been designed with negligible propagation delay. If it is deployed directly in an underwater environment,the UANs will perform inefficiently. In this paper,the characteristics of underwater acoustic channel are modeled and simulated by using the OPNET simulation tool,which are the speed of sound, propagation loss, and four sources for ambient noise: the turbulence,shipping,wind driven waves and thermal noise. The performance of pure Aloha( P-Aloha),carrier sense multiple access with collision avoidance( CSMA / CA) and multiple access collision avoidance for wireless local area network( MACAW) protocols in underwater acoustic channel environment are evaluated. The different performance of protocols in underwater environment is compared in the simulation.
文摘Two significant issues in Internet-based networked control systems ( INCSs), transport performance of different protocols and security breach from Internet side, are investigated. First, for improving the performance of data transmission, user datagram protocol (UDP) is adopted as the main stand for controllers and plants using INCSs. Second, a dual-channel secure transmission scheme (DCSTS)based on data transmission characteristics of INCSs is proposed, in which a raw UDP channel and a secure TCP (transmission control protocol) connection making use of SSL/TLS (secure sockets layer/transport layer security) are included. Further, a networked control protocol (NCP) at application layer for supporting DCSTS between the controllers and plants in INCSs is designed, and it also aims at providing a universal communication mechanism for interoperability of devices among the networked control laboratories in Beijing Institute of Technology of China, Central South University of China and Tokyo University of Technology of Japan. By means of a networked single-degree-of-free- dom robot arm, an INCS under the new protocol and security environment is created. Compared with systems such as IPSec or SSL/TLS, which may cause more than 91% network throughput deduction, the new DCSTS protocol may yield results ten times better, being just 5.67%.
文摘With the advances in enterprise communication and web technologies, web has evolved into a platform for delivering interactive applications. Web-based applications are revolutionizing both the features that can be delivered and the technologies for developing and deploying applications. In this paper, we present a web-based load-adaptive network management system framework. Our system is scalable, extendable, modular and based on open architecture. It is also load-adaptive as it can adapt to the increase in the number of incoming Web Service requests so that the systems performance will not degrade under heavy request loads. To evaluate the proposed architecture, we built a multi-tiered web application testbed with open-source components widely used in industry. Experimental studies conducted on the testbed demonstrated the effectiveness of the proposed approach. By developing the platform and making it available to the research community, we hope to catalyze the development of an open source stack for Web-based network management and monitoring.
基金the National Natural Science Foundation of China under Grant 60372107.
文摘Energy efficiency is the primary issue for the Medium Access Control (MAC) protocol in sensor networks. Adopting periodic sleep,adaptive listen,overhearing avoidance and message passing mechanisms,the Sensor Medium Access Control (S-MAC) protocol improves energy efficiency and latency in the network. There are mainly two methods to enhance the S-MAC protocol: dynamic adjustment,and sending control and data packets under different transport conditions. For the wireless sensor network,it is not realistic to design one MAC protocol that meets all requirements of every aspect; however,it is possible to design corresponding protocols in accordance with different requirements by flexibly adopting different methods.
文摘In a Wireless Mesh Network(WMN),the convenience of a routing strategy strongly depends on the mobility of the intermediate nodes that compose the paths.Taking this behaviour into account,this paper presents a routing scheme that works differently accordingly to the node mobility.In this sense,a proactive routing scheme is restricted to the backbone to promote the use of stable routes.Conversely,the reactive protocol is used for searching routes to or from a mobile destination.Both approaches are simultaneously implemented in the mesh nodes so that the routing protocols share routing information that optimises the network performance.Aimed at guaranteeing the IP compatibility,the combination of the two protocols in the core routers is carried out in the Medium Access Control(MAC)layer.In contrast to the operation in the IP layer where two routing protocols cannot work concurrently,the transfer of the routing tasks to the MAC layer enables the use of multiple independent forwarding tables.Simulation results show the advantage of the proposal in terms of packet losses and data delay.
文摘Based on a media access and control(MAC)protocol,an arrangement of channels and transceivers in optical packet switching dense wavelength division multiplexing(DWDM)networks is proposed in this paper.In order to reduce the cost of nodes,fixed transmitters and receivers are used instead of tunable transmitters and receivers.Two fixed transmitters and many fixed receivers are used in each node in the scheme.The average waiting delay of this scheme is analyzed through mathematics and computer simulation.The result shows that the property of the scheme is almost the same as using tunable transmitter and receiver.Furthermore,if the tuning time of tunable transmitters is taken into account,the performance of the tunable transmitter scheme is poor than this scheme at the average waiting delay and throughput of the network.
文摘The adoption of Internet of Things(IoT)sensing devices is growing rapidly due to their ability to provide realtime services.However,it is constrained by limited data storage and processing power.It offloads its massive data stream to edge devices and the cloud for adequate storage and processing.This further leads to the challenges of data outliers,data redundancies,and cloud resource load balancing that would affect the execution and outcome of data streams.This paper presents a review of existing analytics algorithms deployed on IoT-enabled edge cloud infrastructure that resolved the challenges of data outliers,data redundancies,and cloud resource load balancing.The review highlights the problems solved,the results,the weaknesses of the existing algorithms,and the physical and virtual cloud storage servers for resource load balancing.In addition,it discusses the adoption of network protocols that govern the interaction between the three-layer architecture of IoT sensing devices enabled edge cloud and its prevailing challenges.A total of 72 algorithms covering the categories of classification,regression,clustering,deep learning,and optimization have been reviewed.The classification approach has been widely adopted to solve the problem of redundant data,while clustering and optimization approaches are more used for outlier detection and cloud resource allocation.
文摘This paper describes how to use medium access control (MAC) isolation to enhance management performance in public wireless LAN (PWLAN). To comply with the IEEE 802.11 standards, a scheme to implement MAC isolation in WLAN access points by re-designing the Distribution_Service component of the MAC state machine is proposed. A variable named dotl 1 Isolation is defined to determine whether the MAC level communication between wireless stations in the same BSS is permitted or not. Finally, a design solution based on MPC860 hardware and embedded Linux software for PWLAN access point is specified. The simulation results of MAC isolation for PWLAN show that the proposed scheme is feasible and effective.
基金supported by the Strategic Leading Project of the Chinese Academy of Sciences(No.XDA15014603).
文摘A reasonable parameter configuration helps improve the data transmission performance of the Licklider Transmission Protocol(LTP).Previous research has focused mainly on parameter optimization for LTP in simplified scenarios with one to two hops or multihop scenarios with a custody mechanism of the Bundle Protocol(BP).However,the research results are not applicable to communications in Complex Deep Space Networks(CDSNs)without the custody mechanism of BP that are more suitable for deep space communications with LTP.In this paper,we propose a model of file delivery time for LTP in CDSNs.Based on the model,we propose a Parameter Optimization Design Algorithm for LTP(LTP-PODA)of configuring reasonable parameters for LTP.The results show that the accuracy of the proposed model is at least 6.47%higher than that of the previously established models based on simple scenarios,and the proposed model is more suitable for CDSNs.Moreover,the LTP parameters are optimized by the LTP-PODA algorithm to obtain an optimization plan.Configuring the optimization plan for LTP improves the protocol transmission performance by at least 18.77%compared with configuring the other parameter configuration plans.
基金supports provided by the National Natural Science Foundation of China (No.50904070)the China Postdoctoral Science Foundation (No.20100471009)+2 种基金the National High Technology Research and Development Program of China (Nos. 2008AA062200 and2007AA01Z180)the Key Project of Jiangsu (No. BG2007012)the Science Foundation of China University of Mining and Technology (No. OC080303)
文摘Wireless sensor networks (WSNs) are important application for safety monitoring in underground coal mines, which are difficult to monitor due to natural conditions. Based on the characteristic of limited energy for WSNs in confined underground area such as coal face and laneway, we presents an energy- efficient clustering routing protocol based on weight (ECRPW) to prolong the lifetime of networks. ECRPW takes into consideration the nodes' residual energy during the election process of cluster heads. The constraint of distance threshold is used to optimize cluster scheme. Furthermore, the protocol also sets up a routing tree based on cluster heads' weight. The results show that ECRPW had better perfor- mance in energy consumption, death ratio of node and network lifetime.