• Title/Summary/Keyword: Opportunistic network

Search Result 138, Processing Time 0.019 seconds

Lightweight and adaptable solution for security agility

  • Vasic, Valter;Mikuc, Miljenko;Vukovic, Marin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1212-1228
    • /
    • 2016
  • Secure communication is an important aspect of today's interconnected environments and it can be achieved by the use of cryptographic algorithms and protocols. However, many existing cryptographic mechanisms are tightly integrated into communication protocols. Issues emerge when security vulnerabilities are discovered in cryptographic mechanisms because their replacement would eventually require replacing deployed protocols. The concept of cryptographic agility is the solution to these issues because it allows dynamic switching of cryptographic algorithms and keys prior to and during the communication. Most of today's secure protocols implement cryptographic agility (IPsec, SSL/TLS, SSH), but cryptographic agility mechanisms cannot be used in a standalone manner. In order to deal with the aforementioned limitations, we propose a lightweight cryptographically agile agreement model, which is formally verified. We also present a solution in the Agile Cryptographic Agreement Protocol (ACAP) that can be adapted on various network layers, architectures and devices. The proposed solution is able to provide existing and new communication protocols with secure communication prerequisites in a straightforward way without adding substantial communication overhead. Furthermore, it can be used between previously unknown parties in an opportunistic environment. The proposed model is formally verified, followed by a comprehensive discussion about security considerations. A prototype implementation of the proposed model is demonstrated and evaluated.

Power Saving and Improving the Throughput of Spectrum Sharing in Wideband Cognitive Radio Networks

  • Li, Shiyin;Xiao, Shuyan;Zhang, Maomao;Zhang, Xiaoguang
    • Journal of Communications and Networks
    • /
    • v.17 no.4
    • /
    • pp.394-405
    • /
    • 2015
  • This paper considers a wideband cognitive radio network which can simultaneously sense multiple narrowband channels and thus aggregate the detected available channels for transmission and proposes a novel cognitive radio system that exhibits improved sensing throughput and can save power consumption of secondary user (SU) compared to the conventional cognitive radio system studied so far. More specifically, under the proposed cognitive radio system, we study the problem of designing the optimal sensing time and power allocation strategy, in order to maximize the ergodic throughput of the proposed cognitive radio system under two different schemes, namely the wideband sensing-based spectrum sharing scheme and the wideband opportunistic spectrum access scheme. In our analysis, besides the average interference power constraint at primary user, the average transmit power constraint of SU is also considered for the two schemes and then a subgradient algorithm is developed to obtain the optimal sensing time and the corresponding power allocation strategy. Finally, numerical simulations are presented to verify the performance of the two proposed schemes.

Hybrid Spectrum Sharing with Cooperative Secondary User Selection in Cognitive Radio Networks

  • Kader, Md. Fazlul;Asaduzzaman, Asaduzzaman;Hoque, Md. Moshiul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.9
    • /
    • pp.2081-2100
    • /
    • 2013
  • In this paper, we propose a cooperative hybrid spectrum sharing protocol by jointly considering interweave (opportunistic) and underlay schemes. In the proposed protocol, secondary users can access the licensed spectrum along with the primary system. Our network scenario comprises a single primary transmitter-receiver (PTx-PRx) pair and a group of M secondary transmitter-receiver (STx-SRx) pairs within the transmission range of the primary system. Secondary transmitters are divided into two groups: active and inactive. A secondary transmitter that gets an opportunity to access the secondary spectrum is called "active". One of the idle or inactive secondary transmitters that achieves the primary request target rate $R_{PT}$ will be selected as a best decode-and-forward (DF) relay (Re) to forward the primary information when the data rate of the direct link between PTx and PRx falls below $R_{PT}$. We investigate the ergodic capacity and outage probability of the primary system with cooperative relaying and outage probability of the secondary system. Our theoretical and simulation results show that both the primary and secondary systems are able to achieve performance improvement in terms of outage probability. It is also shown that ergodic capacity and outage probability improve when the active secondary transmitter is located farther away from the PRx.

Design of optimum criterion for opportunistic multi-hop routing in cognitive radio networks

  • Yousofi, Ahmad;Sabaei, Masoud;Hosseinzadeh, Mehdi
    • ETRI Journal
    • /
    • v.40 no.5
    • /
    • pp.613-623
    • /
    • 2018
  • The instability of operational channels on cognitive radio networks (CRNs), which is due to the stochastic behavior of primary users (PUs), has increased the complexity of the design of the optimal routing criterion (ORC) in CRNs. The exploitation of available opportunities in CRNs, such as the channel diversity, as well as alternative routes provided by the intermediate nodes belonging to routes (internal backup routes) in the route-cost (or weight) determination, complicate the ORC design. In this paper, to cover the channel diversity, the CRN is modeled as a multigraph in which the weight of each edge is determined according to the behavior of PU senders and the protection of PU receivers. Then, an ORC for CRNs, which is referred to as the stability probability of communication between the source node and the destination node (SPC_SD), is proposed. SPC_SD, which is based on the obtained model, internal backup routes, and probability theory, calculates the precise probability of communication stability between the source and destination. The performance evaluation is conducted using simulations, and the results show that the end-to-end performance improved significantly.

Channel Selection for Spectrum Sharing in Wireless Networks

  • Park, Jae Cheol;Kang, Kyu-Min;Park, Seungkeun
    • ETRI Journal
    • /
    • v.38 no.5
    • /
    • pp.952-961
    • /
    • 2016
  • In this paper, we study a spectrum sharing network (SSN) where a spectrum sharing device (SSD) coexists with multiple wireless communication systems (WCSs) in the same channel. The SSD can operate with either a duty cycle (DC) channel access mechanism or a listen-before-talk (LBT) channel access mechanism, whereas WCSs operate with an LBT mechanism. An opportunistic channel selection scheme for the SSD in the SSN is first proposed to minimize the outage probability. The optimal data transmission time for the DC-based SSD is derived to further improve the outage probability. We also derive the exact and closed-form outage probability of the proposed channel selection in the SSN by assuming that the number of WCSs operating in each channel is uniformly distributed. The simulation results show that the proposed channel selection scheme outperforms other channel selection schemes. It was also observed that a DC-based SSD with an optimal data transmission time provides a better outage performance than an LBT-based SSD. As the number of available channels increases, the channel selection scheme plays an important role in minimizing the outage probability of the SSNs.

Scate: A Scalable Time and Energy Aware Actor Task Allocation Algorithm in Wireless Sensor and Actor Networks

  • Sharifi, Mohsen;Okhovvat, Morteza
    • ETRI Journal
    • /
    • v.34 no.3
    • /
    • pp.330-340
    • /
    • 2012
  • In many applications of wireless sensor actor networks (WSANs) that often run in harsh environments, the reduction of completion times of tasks is highly desired. We present a new time-aware, energy-aware, and starvation-free algorithm called Scate for assigning tasks to actors while satisfying the scalability and distribution requirements of WSANs with semi-automated architecture. The proposed algorithm allows concurrent executions of any mix of small and large tasks and yet prevents probable starvation of tasks. To achieve this, it estimates the completion times of tasks on each available actor and then takes the remaining energies and the current workloads of these actors into account during task assignment to actors. The results of our experiments with a prototyped implementation of Scate show longer network lifetime, shorter makespan of resulting schedules, and more balanced loads on actors compared to when one of the three well-known task-scheduling algorithms, namely, the max-min, min-min, and opportunistic load balancing algorithms, is used.

A MAC Protocol for Link Maintenance in Multichannel Cognitive Radio Ad Hoc Networks

  • Li, Jingye;Luo, Tao;Gao, Jing;Yue, Guangxin
    • Journal of Communications and Networks
    • /
    • v.17 no.2
    • /
    • pp.172-183
    • /
    • 2015
  • To provide an efficient link maintenance approach, we propose a cross layer medium access control (LM-MAC) protocol for multichannel cognitive radio ad hoc networks. Link establishment and reliable transmission are two key problems for a perfect link maintenance mechanism. Since the cognitive user (CU) pairs have to reestablish their links each frame, in the proposed MAC protocol, three different access modes are designed to guarantee transmission efficiency in continuous frames. To enhance the transmission reliability, each CU will create a father spectrum list (FSL) after joining in the network. FSL is divided into three groups of sub-channels with different functions to compensate the packet loss caused by the primary users' appearance and the deep fading. Meanwhile, since the transmitter and the receiver will share the same FSL, periodical cooperative sensing is adopted to further optimize the former problem. Finally, compared with the existing opportunistic multichannel (OMC)-MAC protocol, the proposed LM-MAC protocol achieves better system performance in terms of saturation throughput, continuity and access delay.

Throughput Maximization for a Primary User with Cognitive Radio and Energy Harvesting Functions

  • Nguyen, Thanh-Tung;Koo, Insoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.3075-3093
    • /
    • 2014
  • In this paper, we consider an advanced wireless user, called primary-secondary user (PSU) who is capable of harvesting renewable energy and connecting to both the primary network and cognitive radio networks simultaneously. Recently, energy harvesting has received a great deal of attention from the research community and is a promising approach for maintaining long lifetime of users. On the other hand, the cognitive radio function allows the wireless user to access other primary networks in an opportunistic manner as secondary users in order to receive more throughput in the current time slot. Subsequently, in the paper we propose the channel access policy for a PSU with consideration of the energy harvesting, based on a Partially Observable Markov decision process (POMDP) in which the optimal action from the action set will be selected to maximize expected long-term throughput. The simulation results show that the proposed POMDP-based channel access scheme improves the throughput of PSU, but it requires more computations to make an action decision regarding channel access.

The Role of Upper Airway Microbiome in the Development of Adult Asthma

  • Purevsuren Losol;Jun-Pyo Choi;Sae-Hoon Kim;Yoon-Seok Chang
    • IMMUNE NETWORK
    • /
    • v.21 no.3
    • /
    • pp.19.1-19.18
    • /
    • 2021
  • Clinical and molecular phenotypes of asthma are complex. The main phenotypes of adult asthma are characterized by eosinophil and/or neutrophil cell dominant airway inflammation that represent distinct clinical features. Upper and lower airways constitute a unique system and their interaction shows functional complementarity. Although human upper airway contains various indigenous commensals and opportunistic pathogenic microbiome, imbalance of this interactions lead to pathogen overgrowth and increased inflammation and airway remodeling. Competition for epithelial cell attachment, different susceptibilities to host defense molecules and antimicrobial peptides, and the production of proinflammatory cytokine and pattern recognition receptors possibly determine the pattern of this inflammation. Exposure to environmental factors, including infection, air pollution, smoking is commonly associated with asthma comorbidity, severity, exacerbation and resistance to anti-microbial and steroid treatment, and these effects may also be modulated by host and microbial genetics. Administration of probiotic, antibiotic and corticosteroid treatment for asthma may modify the composition of resident microbiota and clinical features. This review summarizes the effect of some environmental factors on the upper respiratory microbiome, the interaction between host-microbiome, and potential impact of asthma treatment on the composition of the upper airway microbiome.

Analysis on the candidate number of channels to transmit second users in the myopic/CA method for dynamic spectrum access (동적 스팩트럼 접속을 위한 myopic/CA 방식에서 이차 사용자가 전송할 후보채널수에 대한 분석)

  • Yang, Geun-ho;Ma, Hwan-gu;Lee, Yutae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.401-403
    • /
    • 2013
  • Myopic method which is one of dynamic spectrum access method is an advantage that it maximizes immediate throughput is not complicated, and the simple and effective. The disadvantage of myopic method is that there may become less efficient because of conflicts between users secondary secondary user becomes many. Between the secondary if the secondary all users, select a channel to maximize the throughput of their own without considering the secondary other users, but it will try transfer secondary most users select the same channel collision will be more. Myopic / CA method has been proposed to solve this problem. Instead of selecting one channel to maximize their performance, select a candidate channels plurality of their advantage, the secondary user transfers to randomly selected channel that one in this way is a scheme. In this paper, we analyze whether it can be defined in a number of the channel number of candidates, depending on the network environment, maximizes the performance of the entire network.

  • PDF