311 |
Optimizing bandwidth of tactical communications systemsCox, Criston W. 06 1900 (has links)
Current tactical networks are oversaturated, often slowing systems down to unusable speeds. Utilizing data collected from major exercises and Operation Iraqi Freedom II (OIF II), a typical model of existing tactical network performance is modeled and analyzed using NETWARS, a DISA sponsored communication systems modeling and simulation program. Optimization technologies are then introduced, such as network compression, caching, Quality of Service (QoS), and the Space Communication Protocol Standards Transport Protocol (SCPS-TP). The model is then altered to reflect an optimized system, and simulations are run for comparison. Data for the optimized model was obtained by testing commercial optimization products known as Protocol Enhancement Proxies ( Support Activity (MCTSSA) testing laboratory.
|
312 |
Mechanisms for improving energy efficiency in wireless sensor networksUnknown Date (has links)
A Wireless Sensor Network (WSN) is composed of a large number of sensor nodes that are densely deployed in an area. One of the main issues addressed in WSNs research is energy efficiency due to sensors' limited energy resources. WSNs are deployed to monitor and control the physical environment, and to transmit the collected data to one or more sinks using multi-hop communication. Energy efficiency protocols represent a key mechanism in WSNs. This dissertation proposes several methods used to prolong WSNs lifetime focusing on designing energy efficient communication protocols. A critical issue for data gathering in WSNs is the formation of energy holes near the sinks where sensor nodes participate more in relaying data on behalf of other sensors. The solution proposed in this dissertation is to use mobile sinks that change their location to overcome the formation of energy holes. First, a study of the improvement in network lifetime when sinks move along the perimeter of a hexagonal tiling is conveyed. Second, a design of a distributed and localized algorithm used by sinks to decide their next move is proposed. Two extensions of the distributed algorithm, coverage and time-delivery requirement, are also addressed. Sensor scheduling mechanisms are used to increase network lifetime by sending redundant sensor nodes to sleep. In this dissertation a localized connected dominating set based approach is used to optimize network lifetime of a composite event detection application. A set of active nodes form a connected set that monitor the environment and send data to sinks. After some time, a new active nodes set is chosen. Thus, network lifetime is prolonged by alternating the active sensors. QoS is another main issue encountered in WSNs because of the dynamically changing network topology. / This dissertation introduces an energy efficient QoS based routing for periodic and event-based reporting applications. A geographic routing mechanism combined with QoS support is used to forward packets in the network. Congestion control is achieved by using a ring or barrier mechanism that captures and aggregates messages that report the same event to the same sink. The main operations of the barrier mechanism are presented in this dissertation. / by Mirela Ioana Fonoage. / Vita. / Thesis (Ph.D.)--Florida Atlantic University, 2010. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2010. Mode of access: World Wide Web.
|
313 |
Design and analysis of key establishment protocolsUnknown Date (has links)
Consider a scenario where a server S shares a symmetric key kU with each user U. Building on a 2-party solution of Bohli et al., we describe an authenticated 3-party key establishment which remains secure if a computational Bilinear Diffie Hellman problem is hard or the server is uncorrupted. If the BDH assumption holds during a protocol execution, but is invalidated later, entity authentication and integrity of the protocol are still guaranteed. Key establishment protocols based on hardness assumptions, such as discrete logarithm problem (DLP) and integer factorization problem (IFP) are vulnerable to quantum computer attacks, whereas the protocols based on other hardness assumptions, such as conjugacy search problem and decomposition search problem can resist such attacks. The existing protocols based on the hardness assumptions which can resist quantum computer attacks are only passively secure. Compilers are used to convert a passively secure protocol to an actively secure protoc ol. Compilers involve some tools such as, signature scheme and a collision-resistant hash function. If there are only passively secure protocols but not a signature scheme based on same assumption then the application of existing compilers requires the use of such tools based on different assumptions. But the introduction of new tools, based on different assumptions, makes the new actively secure protocol rely on more than one hardness assumptions. We offer an approach to derive an actively secure two-party protocol from a passively secure two-party protocol without introducing further hardness assumptions. This serves as a useful formal tool to transform any basic algebric method of public key cryptography to the real world applicaticable cryptographic scheme. In a recent preprint, Vivek et al. propose a compiler to transform a passively secure 3-party key establishment to a passively secure group key establishment. To achieve active security, they apply this compiler to Joux's / protoc ol and apply a construction by Katz and Yung, resulting in a 3-round group key establishment. In this reserach, we show how Joux's protocol can be extended to an actively secure group key establishment with two rounds. The resulting solution is in the standard model, builds on a bilinear Diffie-Hellman assumption and offers forward security as well as strong entity authentication. If strong entity authentication is not required, then one half of the participants does not have to send any message in the second round, which may be of interest for scenarios where communication efficiency is a main concern. / by Kashi Neupane. / Thesis (Ph.D.)--Florida Atlantic University, 2012. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2012. Mode of access: World Wide Web.
|
314 |
Design and implementation of efficient routing protocols in delay tolerant networksUnknown Date (has links)
Delay tolerant networks (DTNs) are occasionally-connected networks that may suffer from frequent partitions. DTNs provide service despite long end to end delays or infrequent connectivity. One fundamental problem in DTNs is routing messages from their source to their destination. DTNs differ from the Internet in that disconnections are the norm instead of the exception. Representative DTNs include sensor-based networks using scheduled intermittent connectivity, terrestrial wireless networks that cannot ordinarily maintain end-to-end connectivity, satellite networks with moderate delays and periodic connectivity, underwater acoustic networks with moderate delays and frequent interruptions due to environmental factors, and vehicular networks with cyclic but nondeterministic connectivity. The focus of this dissertation is on routing protocols that send messages in DTNs. When no connected path exists between the source and the destination of the message, other nodes may relay the message to the destination. This dissertation covers routing protocols in DTNs with both deterministic and non-deterministic mobility respectively. In DTNs with deterministic and cyclic mobility, we proposed the first routing protocol that is both scalable and delivery guaranteed. In DTNs with non-deterministic mobility, numerous heuristic protocols are proposed to improve the routing performance. However, none of those can provide a theoretical optimization on a particular performance measurement. In this dissertation, two routing protocols for non-deterministic DTNs are proposed, which minimizes delay and maximizes delivery rate on different scenarios respectively. First, in DTNs with non-deterministic and cyclic mobility, an optimal single-copy forwarding protocol which minimizes delay is proposed. / In DTNs with non-deterministic mobility, an optimal multi-copy forwarding protocol is proposed. which maximizes delivery rate under the constraint that the number of copies per message is fixed . Simulation evaluations using both real and synthetic trace are conducted to compare the proposed protocols with the existing ones. / by Cong Liu. / Vita. / Thesis (Ph.D.)--Florida Atlantic University, 2009. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2009. Mode of access: World Wide Web.
|
315 |
Probabilistic predictor-based routing in disruption-tolerant networksUnknown Date (has links)
Disruption-Tolerant Networks (DTNs) are the networks comprised of a set of wireless nodes, and they experience unstable connectivity and frequent connection disruption because of the limitations of radio range, power, network density, device failure, and noise. DTNs are characterized by their lack of infrastructure, device limitation, and intermittent connectivity. Such characteristics make conventional wireless network routing protocols fail, as they are designed with the assumption the network stays connected. Thus, routing in DTNs becomes a challenging problem, due to the temporal scheduling element in a dynamic topology. One of the solutions is prediction-based, where nodes mobility is estimated with a history of observations. Then, the decision of forwarding messages during data delivery can be made with that predicted information. Current prediction-based routing protocols can be divided into two sub-categories in terms of that whether they are probability related: probabilistic and non-probabilistic. This dissertation focuses on the probabilistic prediction-based (PPB) routing schemes in DTNs. We find that most of these protocols are designed for a specified topology or scenario. So almost every protocol has some drawbacks when applied to a different scenario. Because every scenario has its own particular features, there could hardly exist a universal protocol which can suit all of the DTN scenarios. Based on the above motivation, we investigate and divide the current DTNs scenarios into three categories: Voronoi-based, landmark-based, and random moving DTNs. For each category, we design and implement a corresponding PPB routing protocol for either basic routing or a specified application with considering its unique features. / Specifically, we introduce a Predict and Relay routing protocol for Voronoi-based DTNs, present a single-copy and a multi-copy PPB routing protocol for landmark-based DTNs, and propose DRIP, a dynamic Voronoi region-based publish/subscribe protocol, to adapt publish/subscribe systems to random moving DTNs. New concepts, approaches, and algorithms are introduced during our work. / by Quan Yuan. / Vita. / Thesis (Ph.D.)--Florida Atlantic University, 2009. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2009. Mode of access: World Wide Web.
|
316 |
Adaptive power control in 802.11 networksUnknown Date (has links)
IEEE 802.11 networks successfully satisfy high data demands and are cheaper compared to cellular networks. Modern mobile computers and phones are equipped with 802.11 and are VoIP capable. Current network designs do not dynamically accommodate changes in the usage. We propose a dynamic power control algorithm that provides greater capacity within a limited geographic region. Most other power algorithms necessitate changes in 802.11 requiring hardware changes. Proposed algorithm only requires firmware updates to enable dynamic control of APs transmit power. We use earlier studies to determine the limit of the number of users to optimize power. By lowering transmit power of APs with large number of users, we can effectively decrease the cell size. The resulting gap is then covered by dynamically activating additional APs. This also provides greater flexibility and reduces the network planning costs. / by Serkan Dural. / Thesis (M.S.C.S.)--Florida Atlantic University, 2009. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2009. Mode of access: World Wide Web.
|
317 |
Geographic Routing Reliability Enhancement in Urban Vehicular Ad Hoc NetworksUnknown Date (has links)
Vehicular Ad hoc Networks (VANETs) have the potential to enable various
kinds of applications aiming at improving road safety and transportation efficiency.
These applications require uni-cast routing, which remains a significant challenge due
to VANETs characteristics. Given VANET dynamic topology, geographic routing
protocols are considered the most suitable for such network due to their scalability
and low overhead. However, the optimal selection of next-hop nodes in geographic
routing is a challenging problem where the routing performance is highly affected by
the variable link quality and bandwidth availability.
In this dissertation, a number of enhancements to improve geographic routing
reliability in VANETs are proposed. To minimize packet losses, the direction and
link quality of next-hop nodes using the Expected Transmission Count (ETX) are
considered to select links with low loss ratios.
To consider the available bandwidth, a cross-layer enchantment of geographic
routing, which can select more reliable links and quickly react to varying nodes load
and channel conditions, is proposed. We present a novel model of the dynamic behavior of a wireless link. It considers the loss ratio on a link, in addition to transmission
and queuing delays, and it takes into account the physical interference e ect on the
link.
Then, a novel geographic routing protocol based on fuzzy logic systems, which
help in coordinating di erent contradicting metrics, is proposed. Multiple metrics
related to vehicles' position, direction, link quality and achievable throughput are
combined using fuzzy rules in order to select the more reliable next-hop nodes for
packet forwarding.
Finally, we propose a novel link utility aware geographic routing protocol,
which extends the local view of the network topology using two-hop neighbor information.
We present our model of link utility, which measures the usefulness of a
two-hop neighbor link by considering its minimum residual bandwidth and packet
loss rate. The proposed protocol can react appropriately to increased network tra c
and to frequent topology dis-connectivity in VANETs.
To evaluate the performance of the proposed protocols, extensive simulation
experiments are performed using network and urban mobility simulation tools. Results
confirm the advantages of the proposed schemes in increased traffic loads and
network density. / Includes bibliography. / Dissertation (Ph.D.)--Florida Atlantic University, 2018. / FAU Electronic Theses and Dissertations Collection
|
318 |
Reliable, energy-aware cross-layer protocol for wireless sensor networksUnknown Date (has links)
This research addresses communication reliability in the highly constrained wireless sensor networks environment. We propose a cross-layer, reliable wireless sensor protocol design. The protocol benefits from the body of research in the two areas of wireless sensors reliability research and wireless sensors energy conservation research. The protocol introduces a new energy saving technique that considers reliability as a design parameter and constraint. The protocol also introduces a new back-off algorithm that dynamically adjusts to the data messages reliability needs. Other cross-layer techniques that the protocol introduces are dynamic MAC retry limit and dynamic transmission power setting that is also based on the messages reliability requirements. Cross layer design is defined as the interaction between the different stack layers with the goal of improving performance. It has been used in ad hoc wireless systems to improve throughput, latency, and quality of service (QoS). The improvements gained in performance come at a price. This includes decreased architecture modularity and designs may be hard to debug, maintain or upgrade. Cross-layer design is valuable for wireless sensor networks due to the severe resource constraints. The proposed protocol uses cross-layer design as a performance and energy optimization technique. Nevertheless, the protocol avoids introducing layer interdependencies by preserving the stack architecture and optimizes the overall system energy and reliability performance by information sharing. The information is embedded as flags in the data and control messages that are moving through the stack. Each layer reads these flags and adjusts its performance and handling of the message accordingly. The performance of the proposed protocol is evaluated using simulation modeling. The reference protocol used for evaluation is APTEEN. / We developed simulation programs for the proposed protocol and for APTEEN protocol using the JiST/SWANS simulation tool. The performance evaluation results show that the proposed protocol achieves better energy performance than the reference protocol. Several scalability experiments show that the proposed protocol scales well and has better performance for large networks. Also, exhaustive bandwidth utilization experiments show that for heavily-utilized or congested networks, the proposed protocol has high reliability in delivering messages classified as important. / by Ahmed Badi. / Thesis (Ph.D.)--Florida Atlantic University, 2009. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2009. Mode of access: World Wide Web.
|
319 |
A utility-based routing scheme in multi-hop wireless networksUnknown Date (has links)
Multi-hop wireless networks are infrastructure-less networks consisting of mobile or stationary wireless devices, which include multi-hop wireless mesh networks and multi-hop wireless sensor networks. These networks are characterized by limited bandwidth and energy resources, unreliable communication, and a lack of central control. These characteristics lead to the research challenges of multi-hop wireless networks. Building up routing schemes with good balance among the routing QoS (such as reliability, cost, and delay) is a paramount concern to achieve high performance wireless networks. These QoS metrics are internally correlated. Most existing works did not fully utilize this correlation. We design a metric to balance the trade-off between reliability and cost, and build up a framework of utility-based routing model in multi-hop wireless networks. This dissertation focuses on the variations with applications of utility-based routing models, designing new concepts, and developing new algorithms for them. A review of existing routing algorithms and the basic utility-based routing model for multi-hop wireless networks has been provided at the beginning. An efficient algorithm, called MaxUtility, has been proposed for the basic utility-based routing model. MaxUtility is an optimal algorithm that can find the best routing path with the maximum expected utility. / Various utility-based routing models are extended to further enhance the routing reliability while reducing the routing overhead. Besides computing the optimal path for a given benefit value and a given source-destination pair, the utility-based routing can be further extended to compute all optimal paths for all possible benefit values and/or all source-destination pairs. Our utility-based routing can also adapt to different applications and various environments. In the self-organized environment, where network users are selfish, we design a truthful routing, where selfish users have to tell the truth in order to maximize their utilities. We apply our utility-based routing scheme to the data-gathering wireless sensor networks, where a routing scheme is required to transmit data sensed by multiple sensor nodes to a common sink node. / by Mingming Lu. / Vita. / University Library's copy lacks signatures of Supervisory Committee. / Thesis (Ph.D.)--Florida Atlantic University, 2008. / Includes bibliography. / Electronic reproduction. Boca Raton, FL : 2008 Mode of access: World Wide Web.
|
320 |
Patterns for wireless sensor networksUnknown Date (has links)
Sensors are shaping many activities in our society with an endless array of potential applications in military, civilian, and medical application. They support different real world applications ranging from common household appliances to complex systems. Technological advancement has enabled sensors to be used in medical applications, wherein they are deployed to monitor patients and assist disabled patients. Sensors have been invaluable in saving lives, be it a soldier's life in a remote battlefield or a civilian's life in a disaster area or natural calamities. In every application the sensors are deployed in a pre-defined manner to perform a specific function. Understanding the basic structure of a sensor node is essential as this would be helpful in using the sensors in devices and environments that have not been explored. In this research, patterns are used to present a more abstract view of the structure and architecture of sensor nodes and wireless sensor networks. This would help an application designer to choose from different types of sensor nodes and sensor network architectures for applications such as robotic landmine detection or remote patient monitoring systems. Moreover, it would also help the network designer to reuse, combine or modify the architectures to suit more complex needs. More importantly, they can be integrated with complete IT applications. One of the important applications of wireless sensor networks in the medical field is a remote patient monitoring system. In this work, patterns were developed to describe the architecture of patient monitoring system. / This pattern describes how to connect sensor nodes and other wireless devices with each other to form a network that aims to monitor the vital signs of a person and report it to a central system. This central system could be accessed by the patient's healthcare provider for treatment purposes. This system shows one of the most important applications of sensors and it application which needs to be integrated with medical records and the use of patterns makes this integration much simpler. / by Anupama Sahu. / Thesis (M.S.C.S.)--Florida Atlantic University, 2010. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2010. Mode of access: World Wide Web.
|
Page generated in 0.0273 seconds