• Title/Summary/Keyword: Multi-hop wireless networks

Search Result 333, Processing Time 0.029 seconds

Power based Routing Scheme for wireless sensor networks (무선 센서네트워크에서의 전력기반 라우팅기법)

  • Ernest, Mugisha;Lee, Geun-Soo;Kim, Namho;Yu, Yun-Seop;Park, Hyung-Kun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.657-658
    • /
    • 2015
  • In an wireless sensor network, energy efficient routing protocol is important for multi-hop transmission because senor nodes are powered by battery. In multi-hop transmission, specifice nodes are used and the battery power becomes low, it induce the asymetric remaining power among the nodes and makes the network lifetime reduced. In this paper, we propose a power-aware routing protocol which determines the routing path considering the remaining power of the nodes. Simulation results shows that the proposed routing scheme minimize the transmission delay and increase the network lifetime.

  • PDF

FENC: Fast and Efficient Opportunistic Network Coding in wireless networks

  • Pahlavani, Peyman;Derhami, Vali;Bidoki, Ali Mohammad Zareh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.1
    • /
    • pp.52-67
    • /
    • 2011
  • Network coding is a newly developed technology that can cause considerable improvements in network throughput. COPE is the first network coding approach for wireless mesh networks and it is based on opportunistic Wireless Network Coding (WNC). It significantly improves throughput of multi-hop wireless networks utilizing network coding and broadcast features of wireless medium. In this paper we propose a new method, called FENC, for opportunistic WNC that improves the network throughput. In addition, its complexity is lower than other opportunistic WNC approaches. FENC utilizes division and conquer method to find an optimal network coding. The numerical results show that the proposed opportunistic algorithm improves the overall throughput as well as network coding approach.

Address Auto-configuration in Broadband Convergence Networks for Supporting Multi-Hop User Access Networks (BcN에서 멀티 홉 사용자 액세스 망 수용을 위한 자동 주소 설정)

  • Park, Il-Kyun;Kim, Young-Han
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.809-816
    • /
    • 2005
  • MANET(mobile ad hoc network) cn be one of the access networks of BcN(broadband convergence network), and an user node requires address auto-configuration protocol for mu14i-hop environment. Some address auto-configuration protocols are proposed for independent MANET, but they don't consider BcN-accessable MANET environment. In this paper, new address auto-configuration protocol for wireless nodes is proposed. With this proposal, they ran configure their global addresses automatically in hybrid MANETs as BcN access networks. The autoconfiguration protocol modifies IPv6 NDP(neighbor discovery protocol) messages to deliver global prefix information to all wireless nodes, and avoids message boradcasting to minimize network overhead.

The Security DV-Hop Algorithm against Multiple-Wormhole-Node-Link in WSN

  • Li, Jianpo;Wang, Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.2223-2242
    • /
    • 2019
  • Distance Vector-Hop (DV-Hop) algorithm is widely used in node localization. It often suffers the wormhole attack. The current researches focus on Double-Wormhole-Node-Link (DWNL) and have limited attention to Multi-Wormhole-Node-Link (MWNL). In this paper, we propose a security DV-Hop algorithm (AMLDV-Hop) to resist MWNL. Firstly, the algorithm establishes the Neighbor List (NL) in initialization phase. It uses the NL to find the suspect beacon nodes and then find the actually attacked beacon nodes by calculating the distances to other beacon nodes. The attacked beacon nodes generate and broadcast the conflict sets to distinguish the different wormhole areas. The unknown nodes take the marked beacon nodes as references and mark themselves with different numbers in the first-round marking. If the unknown nodes fail to mark themselves, they will take the marked unknown nodes as references to mark themselves in the second-round marking. The unknown nodes that still fail to be marked are semi-isolated. The results indicate that the localization error of proposed AMLDV-Hop algorithm has 112.3%, 10.2%, 41.7%, 6.9% reduction compared to the attacked DV-Hop algorithm, the Label-based DV-Hop (LBDV-Hop), the Secure Neighbor Discovery Based DV-Hop (NDDV-Hop), and the Against Wormhole DV-Hop (AWDV-Hop) algorithm.

Control Message Transmission Radius for Energy-efficient Clustering in Large Scale Wireless Sensor Networks (스케일이 큰 무선 센서 네트워크에서 에너지 효율적인 클러스터링을 위한 제어 메시지 전송반경)

  • Cui, Huiqing;Kang, Sang Hyuk
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.25 no.1
    • /
    • pp.1-11
    • /
    • 2020
  • Wireless sensor networks consist of a large number of tiny sensor nodes which have limited battery life. In order to maximize the network life span, we propose an optimal transmission radius, R, for control messages. We analyze the transmission radius as a function of the energy consumption of cluster head nodes and the energy consumption of member nodes to find the optimal value of R. In simulations we apply our proposed optimization of transmission range to LEACH-based single-hop and multi-hop networks to show that our proposed scheme outperforms other existing routing algorithms in terms of network life span.

Performance Analysis of Available Superframe Size and Device Discovery Time for Multi-hop Communications in IEEE 802.15.3 High-rate WPAN Mesh Network (IEEE 802.15.3 고속 WPAN 메쉬 네트워크의 멀티-홉 통신을 위한 가용 슈퍼프레임 크기와 디바이스 탐색 성능 분석)

  • Jung, Ssang-Bong;Yim, Soon-Bin;Kim, Hyun-Ki;Lee, Tae-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.6B
    • /
    • pp.350-357
    • /
    • 2007
  • The IEEE 802.15.3 high-rate WPAN has been developed to communicate with devices within l0m. A piconet consists of one Piconet Coordinator (PNC) and several devices. The devices associated with a parent piconet can become child PNCs in order to form child piconets. A mesh network made up of a parent piconet and several child piconets can support multi-hop communications. In this paper, we analyze the maximum level and the avaliable superframe size to make the best use of bandwidth for multi-hop communications, and compare the analysis with the simulation results in terms of time to discover devices for multi-hop communications. The average number of levels in mesh networks is shown to be about 1.9 when the number of devices increases within a fixed area. We have also shown that the maximum available superframe size is 52ms and the discovery time is approximately 155ms.

Connectivity Analysis of Cognitive Radio Ad-hoc Networks with Shadow Fading

  • Dung, Le The;An, Beongku
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.9
    • /
    • pp.3335-3356
    • /
    • 2015
  • In this paper, we analyze the connectivity of cognitive radio ad-hoc networks in a log-normal shadow fading environment. Considering secondary user and primary user's locations and primary user's active state are randomly distributed according to a homogeneous Poisson process and taking into account the spectrum sensing efficiency of secondary user, we derive mathematical models to investigate the connectivity of cognitive radio ad-hoc networks in three aspects and compare with the connectivity of ad-hoc networks. First, from the viewpoint of a secondary user, we study the communication probability of that secondary user. Second, we examine the possibility that two secondary users can establish a direct communication link between them. Finally, we extend to the case of finding the probability that two arbitrary secondary users can communicate via multi-hop path. We verify the correctness of our analytical approach by comparing with simulations. The numerical results show that in cognitive radio ad-hoc networks, high fading variance helps to remarkably improve connectivity behavior in the same condition of secondary user's density and primary user's average active rate. Furthermore, the impact of shadowing on wireless connection probability dominates that of primary user's average active rate. Finally, the spectrum sensing efficiency of secondary user significantly impacts the connectivity features. The analysis in this paper provides an efficient way for system designers to characterize and optimize the connectivity of cognitive radio ad-hoc networks in practical wireless environment.

Throughput-efficient Online Relay Selection for Dual-hop Cooperative Networks

  • Lin, Yuan;Li, Bowen;Yin, Hao;He, Yuanzhi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.6
    • /
    • pp.2095-2110
    • /
    • 2015
  • This paper presents a design for a throughput-efficient online relay selection scheme for dual-hop multi-relay cooperative networks. Problems arise with these networks due to unpredictability of the relaying link quality and high time-consumption to probe the dual-hop link. In this paper, we firstly propose a novel probing and relaying protocol, which greatly reduces the overhead of the dual-hop link estimation by leveraging the wireless broadcasting nature of the network. We then formulate an opportunistic relay selection process for the online decision-making, which uses a tradeoff between obtaining more link information to establish better cooperative relaying and minimizing the time cost for dual-hop link estimation to achieve higher throughput. Dynamic programming is used to construct the throughput-optimal control policy for a typically heterogeneous Rayleigh fading environment, and determines which relay to probe and when to transmit the data. Additionally, we extend the main results to mixed Rayleigh/Rician link scenarios, i.e., where one side of the relaying link experiences Rayleigh fading while the other has Rician distribution. Numerical results validate the effectiveness and superiority of our proposed relaying scheme, e.g., it achieves at least 107% throughput gain compared with the state of the art solution.

Clustering and Communications Scheduling in WSNs using Mixed Integer Linear Programming

  • Avril, Francois;Bernard, Thibault;Bui, Alain;Sohier, Devan
    • Journal of Communications and Networks
    • /
    • v.16 no.4
    • /
    • pp.421-429
    • /
    • 2014
  • We consider the problem of scheduling communications in wireless sensor networks (WSNs) to ensure battery preservation through the use of the sleeping mode of sensors.We propose a communication protocol for 1-hop WSNs and extend it to multi-hop WSNs through the use of a 1-hop clustering algorithm.We propose to schedule communications in each cluster in a virtual communication ring so as to avoid collisions. Since clusters are cliques, only one sensor can speak or listen in a cluster at a time, and all sensors need to speak in each of their clusters at least once to realize the communication protocol. We model this situation as a mathematical program.

A Joint Wakeup Scheduling and MAC Protocol for Energy Efficient Data Forwarding in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율적인 데이터 전송을 위한 스케줄링/ MAC 통합 프로토콜)

  • Cho, Jae-Kyu;Kwon, Tae-Kyoung;Choi, Yang-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.4B
    • /
    • pp.207-214
    • /
    • 2008
  • Under future internet environment, wireless sensor networks will be used in a wide range of applications. A major problem for designing sensor protocol is developing the most energy efficient technique to monitor an area of interest for a long time since sensors have some constraints such as small and a limited energy level. In addition, data latency is often a critical issue since sensory data is transmitted via multi hop fashion and need to be delivered timely for taking an appropriate action. Our motivation for designing a data forwarding protocol is to minimize energy consumption while keeping data latency bound in wireless sensor networks. In this paper, we propose a data forwarding protocol that consists of wakeup scheduling and MAC protocols, the latter of which is designed to achieve load balancing. Simulation results show that the proposed framework provides more energy-efficient delivery than other protocol.